Question 6 of 109SQL injection is a security risk that occurs when the content entered by a user is transferred to a server and directly injected into the SQL code for execution.Question 7 of 109Which of the following parameters can be used as conditions for setting whitelist rules in antivirus protection? (Choose all that apply.)Question 8 of 109Which type of attack does fingerprint learning defend against?Question 9 of 109Which of the following statements is incorrect about the characteristics of the TCP/IP protocol stack?Question 10 of 109DDoS attacks use zombie hosts to send a large number of malicious attack packets to a target. These attack packets congest network links and exhaust system resources, preventing the target from providing services for legitimate users.