Which of the following can allow an attacker to bypass authentication?
Response tampering
Machine enumeration
User agent manipulation
Social engineering
Submit