1.

___________ can be exploited to completely ignore authorization constraints.

Answer»

___________ can be exploited to completely ignore AUTHORIZATION constraints.
Choose the correct OPTION from below list
(1)Cross SITE Scripting
(2)RACE conditions
(3)OS command injection
(4)SQL Injection

Answer:-(3)OS command injection



Discussion

No Comment Found