Which of the following threats cannot be detected by the sandbox virtual execution environment? (Single selection)
Data destruction refers to the use of various technical means to completely delete the data in computer storage devices, so as to prevent unauthorized users from using residual data to restore the original data information, so as to achieve the purpose of protecting key data. Which of the following options is wrong about how data is destroyed?
The SQL injection vulnerability occurs due to the lack of validation of the legitimacy of user input
HiSec Insight's detection of unknown files relies primarily on sandbox detection.