题目
202580-ITIS-4221-001:ITIS-5221-001-XLSDO202580_Combined Midterm Exam
判断题
Attackers may perform reconnaissance on your website by changing parameters using a man-in-the-middle proxy.
选项
A.True
B.False
查看解析
标准答案
Please login to view
思路分析
The statement presents a scenario where an attacker uses a man-in-the-middle (MITM) proxy to alter request parameters as part of reconnaissance on a website. This aligns with how MITM tooling is commonly used in security testing and threat modeling.
First, consider what a MITM proxy does: it sits between the client and the server and can observe, modify, or inject traffic passing through it. By intercepting requests, an attacker can see how the ser......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
An online purchase web application which lets javascript in the browser filter out invalid negative payment amounts is vulnerable to __________.
Content Security Policy (CSP) is enforced by
SQL injection vulnerability could be used to launch reflective cross site scripting attack.
Content Security Policy (CSP) is enforced by
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!