101 Exam QuestionsBrowse all questions from this exam

101 Exam - Question 90


Which of the following methods are used by the BIG-IP ASM System to protect against SQL injections?

Show Answer
Correct Answer: B

The BIG-IP ASM System uses metacharacter enforcement and attack signatures to protect against SQL injections. Metacharacter enforcement ensures that only sanctioned characters are used in input fields, while attack signatures are patterns that identify malicious SQL code. Together, these methods effectively guard against SQL injection attacks.

Discussion

1 comment
Sign in to comment
aatechlerOption: B
Mar 11, 2023

https://my.f5.com/manage/s/article/K10188423