Q
What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?

Answer & Solution

Answer: Option A
Solution:
CSRF Tokens are unique tokens generated for each session or form submission, ensuring that the request originates from the intended user and not an attacker.
Related Questions on Average

Which PHP function is commonly used to validate email addresses submitted through a form?

A). filter_var()

B). preg_match()

C). validate_email()

D). email_check()

Which PHP function is commonly used to check if a form field is empty?

A). empty()

B). isset()

C). is_empty()

D). is_null()

Which PHP function is used to generate a random CSRF token for form submissions?

A). bin2hex()

B). uniqid()

C). md5()

D). openssl_random_pseudo_bytes()

What is the purpose of session management in web applications?

A). Maintaining User State

B). Encrypting Data

C). Preventing SQL Injection

D). Validating Form Data

Which of the following HTTP methods is considered safe and idempotent, making it suitable for form submissions?

A). POST

B). GET

C). PUT

D). DELETE

Which of the following is NOT a common security vulnerability associated with file uploads in web applications?

A). File Inclusion

B). File Upload Vulnerability

C). Path Traversal

D). Cross-Site Request Forgery

Which of the following is a secure method for storing passwords in a database?

A). Hashing

B). Encryption

C). Salting

D). All of the above

Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?

A). SameSite

B). Cache-Control

C). Access-Control-Allow-Origin

D). Content-Security-Policy

Which of the following is NOT a common input validation technique for form data?

A). Regular Expressions

B). Whitelisting

C). Blacklisting

D). Tokenization

What does XSS stand for in the context of web security?

A). Cross-Site Scripting

B). XML Secure Socket

C). External Server Session

D). Cross-Site Sanitization