List of questions
Related questions
Question 572 - 312-50v12 discussion
An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns.
Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?
A.
Implement case variation by altering the case of SQL statements
B.
Employ IP fragmentation to obscure the attack payload
C.
Use Hex encoding to represent the SQL query string
D.
Leverage string concatenation to break identifiable keywords
Your answer:
0 comments
Sorted by
Leave a comment first