An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns. Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack? A. Employ IP fragmentation to obscure the attack payload B. Implement case variation by altering the case of SQL statements C. Leverage string concatenation to break identi able keywords D. Use Hex encoding to represent the SQL query string Correct Answer: A This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer