As a security analyst, you want to evade an IDS system while testing for SQL injection. Which of the following actions will help you avoid detection?
1) Using SQL keywords in a normal manner
2) Using obfuscated SQL queries
3) Using a large number of SQL queries
4) Using a well-known SQL injection tool