Asked by ..

As a security analyst, you want to evade an IDS system while testing for SQL injection vulnerabilities.

Which of the following actions will help you avoid getting compromised

answer

Limit the number of MAC addresses a switch port can learn and accept.


Use in-line comments in strings.


Use a hijacked session ID to not be recognized.


Use switched networks to segment traffic to create isolation.

All Answers 1

Answered by GPT-5 mini AI
Correct answers:
- Limit the number of MAC addresses a switch port can learn and accept.
- Use switched networks to segment traffic to create isolation.

Why: both are defensive network controls that reduce the attack surface and limit lateral movement (MAC‑learning limits rogue devices/MAC‑flood attacks; segmentation contains breaches).

The other two options (using in‑line comments to obfuscate SQL strings, or using a hijacked session ID) are evasion/exploitation techniques, not protections — and attempting them without explicit authorization is illegal/unethical. If you need to test evasions as part of an authorized engagement, do so only in controlled/staged environments and with written approval.