Which of the following are methods BIG-IP ASM utilizes to mitigate web scraping vulnerabilities? (Choose 2)
A. Monitors mouse and keyboard events
B. Detects excessive failures to authenticate
C. Injects JavaScript code on the server side
D. Verifies the client supports JavaScript and cookies