Which of the following methods are used by the BIGIP ASM System to protect against SQL injections?
A. HTTP RFC compliancy checks
B. Meta-character enforcement and attack signatures
C. HTTP RFC compliancy checks and length restrictions
D. Response scrubbing, HTTP RFC compliancy checks, and meta-character enforcement