exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 197 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 197
Topic #: 1
[All 312-50v13 Questions]

An ethical hacker is hired to evaluate the defenses of an organization's database system which is known to employ a signature-based IDS. The hacker knows that some SQL Injection evasion techniques may allow him to bypass the system's signatures. During the operation, he successfully retrieved a list of usernames from the database without triggering an alarm by employing an advanced evasion technique. Which of the following could he have used?

  • A. Utilizing the char encoding function to convert hexadecimal and decimal values into characters that pass-through SQL engine parsing
  • B. Implementing sophisticated matches such as "OR john' = 'john'" in place of classical matches like "OR 1=1"
  • C. Manipulating white spaces in SQL queries to bypass signature detection
  • D. Using the URL encoding method to replace characters with their ASCII codes in hexadecimal form
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mulekule
3 weeks, 2 days ago
Selected Answer: A
A is the correct answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago