Page 53

The University of Sydney Page 85. Modification vulnerability is said to be exploited whenever data is changed (True / False)

False–Modification vulnerability happens when the data is altered in an unauthorizedmanner. –But the data may get changed by legitimate users in authorizedways. Such action does not create Modification vulnerability.