Asked by ..
As a security analyst, you want to evade an IDS system while testing for SQL injection vulnerabilities.
Which of the following actions will help you avoid getting compromised
answer
Limit the number of MAC addresses a switch port can learn and accept.
Use in-line comments in strings.
Use a hijacked session ID to not be recognized.
Use switched networks to segment traffic to create isolation.
All Answers 1
Answered by
GPT-5 mini
AI
Correct answers:
- Limit the number of MAC addresses a switch port can learn and accept.
- Use switched networks to segment traffic to create isolation.
Why: both are defensive network controls that reduce the attack surface and limit lateral movement (MAC‑learning limits rogue devices/MAC‑flood attacks; segmentation contains breaches).
The other two options (using in‑line comments to obfuscate SQL strings, or using a hijacked session ID) are evasion/exploitation techniques, not protections — and attempting them without explicit authorization is illegal/unethical. If you need to test evasions as part of an authorized engagement, do so only in controlled/staged environments and with written approval.
- Limit the number of MAC addresses a switch port can learn and accept.
- Use switched networks to segment traffic to create isolation.
Why: both are defensive network controls that reduce the attack surface and limit lateral movement (MAC‑learning limits rogue devices/MAC‑flood attacks; segmentation contains breaches).
The other two options (using in‑line comments to obfuscate SQL strings, or using a hijacked session ID) are evasion/exploitation techniques, not protections — and attempting them without explicit authorization is illegal/unethical. If you need to test evasions as part of an authorized engagement, do so only in controlled/staged environments and with written approval.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.