Which of the following mitigation techniques is based on anomaly detection?

Which of the following mitigation techniques is based on anomaly detection? (Choose 2)
A. Brute force attack prevention.
B. Cross-site request forgery prevention.
C. Web scraping attack prevention.
D. Parameter tampering prevention.

Download Printable PDF. VALID exam to help you PASS.

Posted in: 101

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.