Which of the following tool can be used to filter web requests associated with the SQL Injection attack?
A . Nmap
B . UrlScan
C . ZAP proxy
D . Hydra
Answer: B
Explanation:
Reference: https://aip.scitation.org/doi/pdf/10.1063/1.4982570
Which of the following tool can be used to filter web requests associated with the SQL Injection attack?
A . Nmap
B . UrlScan
C . ZAP proxy
D . Hydra
Answer: B
Explanation:
Reference: https://aip.scitation.org/doi/pdf/10.1063/1.4982570