اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 416 من 448

كل الأسئلة

An ethical hacker is testing a database behind an IDS that uses strong signatures for common SQL injection patterns. Which evasion technique best bypasses signature-based detection while still executing the SQL injection?

الخيارات

  • A Varying the case of SQL keywords
  • B Using IP fragmentation to obscure the payload
  • C Representing the SQL query string in Hex encoding
  • D Using string concatenation to break recognizable keywords

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.