______________ takes advantage if hidden fields that work as the only security measure in some applications.
(a) Parameter tampering
(b) Data tampering
(c) Tampering of network topology
(d) Protocol tampering
This question was addressed to me in homework.
This intriguing question originated from Attack Vectors in portion Understanding Attack Vectors of Cyber Security