| Which of the following depict the typical impact of failure to restrict URL access?
Choose the correct option from below list
(1)Attackers impersonate any user on the system
(2)Attackers access other users accounts and data
(3)Broken Authentication and Session Management
Answer:-(2)Attackers access other users accounts and data | | |