Exam 101 All QuestionsBrowse all questions from this exam
Question 90

Which of the following methods are used by the BIG-IP ASM System to protect against SQL injections?

    Correct Answer: B

    The BIG-IP ASM System uses metacharacter enforcement and attack signatures to protect against SQL injections. Metacharacter enforcement ensures that only sanctioned characters are used in input fields, while attack signatures are patterns that identify malicious SQL code. Together, these methods effectively guard against SQL injection attacks.

Discussion
aatechlerOption: B

https://my.f5.com/manage/s/article/K10188423