Which of the following is NOT a common security vulnerability associated with file uploads in web applications?
A). File Inclusion
B). File Upload Vulnerability
C). Path Traversal
D). Cross-Site Request Forgery
What is the purpose of using HTTPS (HTTP Secure) in web applications?
A). Encrypting Data
B). Authenticating Users
C). Preventing XSS Attacks
D). Optimizing Page Load Speed
Which of the following is a common security vulnerability associated with form data submission?
A). SQL Injection
B). Form Spamming
C). Broken Authentication
D). Clickjacking
What is the purpose of session management in web applications?
A). Maintaining User State
B). Encrypting Data
C). Preventing SQL Injection
D). Validating Form Data
Which PHP function is commonly used to check if a form field is empty?
A). empty()
B). isset()
C). is_empty()
D). is_null()
Which PHP function is used to generate a random CSRF token for form submissions?
A). bin2hex()
B). uniqid()
C). md5()
D). openssl_random_pseudo_bytes()
What security measure helps prevent form spamming by distinguishing between human users and bots?
A). CAPTCHA
B). HTTPS
C). CSRF Token
D). Two-Factor Authentication
Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?
A). SameSite
B). Cache-Control
C). Access-Control-Allow-Origin
D). Content-Security-Policy
Which of the following is a secure method for storing passwords in a database?
A). Hashing
B). Encryption
C). Salting
D). All of the above
What does XSS stand for in the context of web security?
A). Cross-Site Scripting
B). XML Secure Socket
C). External Server Session
D). Cross-Site Sanitization