Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose two.)
Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose two.)
To mitigate web scraping vulnerabilities, BIG-IP ASM monitors mouse and keyboard events to ensure there is actual human interaction on the website, which helps to distinguish between legitimate users and automated scripts. Additionally, it verifies that the client supports JavaScript and cookies, as many web scraping tools do not handle JavaScript and cookies properly, creating another layer of defense against automated scraping.
A and B ?
https://techdocs.f5.com/en-us/bigip-14-0-0/big-ip-asm-implementations-14-0-0/detecting-and-preventing-web-scraping.html