A successful forced browsing attack indicates a vulnerability in

  1. The configuration management

  2. The session management

  3. The change management process

  4. The authorization process


Correct Option: D

Find more quizzes: