43.4k views
0 votes
________ detection methods for SQL Injection attacks are based on verifying distinct patterns. This approach must be routinely updated and may be unsuccessful against self-modifying attacks.

a.Signature based
b.No Answer
c.None of the Above
d.All of the Above
e.Code Analysis
f.Anomaly based

1 Answer

6 votes
The answer is a

A. Signature based
User Dhruvisha
by
7.6k points
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.