EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 9 : Investigating Web Attacks
         
Questions available : 43 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 463  
   
Attackers exploit web applications using techniques, such as SQL injection. To avoid getting detected by the application firewall and IDS/IPS systems, attackers use various obfuscation techniques to bypass the security mechanisms. One such technique has been implemented in the URL given below. What is the technique implemented?
http://www.websitename.com/accounts.php?id=1+UnIoN/**/SeLecT/**/1,2,3--


 
A:    Char Encoding
 
B:    Replaced Keywords
C:    Toggle Case
 
D:    Hex Encoding
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer




















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations