[&] Why is it advantageous for SQLmap to handle cookies automatically during a scan? - It increases the speed of the scan - It avoids reliance on intercepted requests - It simplifies manual cookie extraction - It ensures cookies are always up-to-date -- Correct [&] What is a common sign that a parameter is vulnerable to Boolean-based blind SQL injection? - The parameter affects the logic of the SQL query -- Correct - The parameter causes syntax errors in SQL - The server returns a 404 error - The page loads slowly [&] Which SQLmap option allows for avoiding manual prompts during a scan? - --delay - --batch -- Correct - --risk - --cookie [&] Why might a web application intercept request be unreliable in identifying SQL injection vulnerabilities? - Cookie handling is automated by tools - They may miss dynamically generated queries -- Correct - User-generated input is required - HTTPS encryption hides vulnerabilities [&] Why might you want to test all parameters even if one is already confirmed injectable? - To ensure maximum vulnerability discovery -- Correct - To confirm the stability of the database - To speed up the injection process - To practice use of SQLmap [&] What is the primary tool used to identify SQL injection vulnerabilities in the video? - Zap - Burp Suite - Metasploit - SQLmap -- Correct