312-50V12 · Question #236
312-50V12 Question #236: Real Exam Question with Answer & Explanation
Sign in or unlock 312-50V12 to reveal the answer and full explanation for question #236. The question stem and answer options stay visible for context.
Question
An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns. Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?
Options
- AEmploy IP fragmentation to obscure the attack payload
- BImplement case variation by altering the case of SQL statements
- CLeverage string concatenation to break identifiable keywords
- DUse Hex encoding to represent the SQL query string
Unlock 312-50V12 to see the answer
You've previewed enough free 312-50V12 questions. Unlock 312-50V12 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.