1.

______________ takes advantage if hidden fields that work as the only security measure in some applications.(a) Parameter tampering(b) Data tampering(c) Tampering of network topology(d) Protocol tamperingThis question was addressed to me in homework.This intriguing question originated from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (a) Parameter TAMPERING

For EXPLANATION I would SAY: Parameter tampering takes advantage if hidden FIELDS that work as the only security measure in some APPLICATIONS. Modifying this hidden field value will cause the web application to change according to new data incorporated.



Discussion

No Comment Found

Related InterviewSolutions