Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention.
B. Cross-site request forgery prevention.
C. Web scraping attack prevention.
D. Parameter tampering prevention.
Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention.
B. Cross-site request forgery prevention.
C. Web scraping attack prevention.
D. Parameter tampering prevention.