As part of a cybersecurity training simulation, you are analyzing traffic logs for suspicious activities targeting a web application. Your task is to identify SQL injection techniques commonly used by attackers. Which two of the following are examples of SQL injection techniques? (Choose two)
A cloud service provider is experiencing a large-scale volumetric DDoS attack, where attackers are generating massive amounts of junk traffic to overwhelm network resources. Which of the following is the most effective mitigation strategy?