Which of the following would allow a test of what would occur if a hacker were able to circumvent a limit imposed by the browser?

A. fuzzers
B. HTTP interceptors
C. white boxes
D. password crackers

B
Explanation: HTTP interceptors intercept web traffic between a browser and a website. They permit actions that the browser would not. For example, it may allow the input of 300 characters, while the browser may enforce a limit of 50. This would allow a test of what would occur if a hacker were able to circumvent the limit imposed by the browser. These applications perform like a web proxy in that they monitor the traffic in both directions.

Computer Science & Information Technology

You might also like to view...

The ________ is a temporary storage location in a computer system's memory

Fill in the blank(s) with correct word

Computer Science & Information Technology

A properly structured recursive algorithm should always contain a Boolean expression in a selection sequence.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology