Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?

Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
A . HTTPS communication
B . Public and private keys
C . Password encryption
D . Sessions and cookies

Answer: D

Latest PT0-002 Dumps Valid Version with 110 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments