Q
Which of the following is NOT a common security vulnerability associated with file uploads in web applications?

Answer & Solution

Answer: Option D
Solution:
Cross-Site Request Forgery (CSRF) is not directly related to file uploads but rather to unauthorized actions performed on behalf of an authenticated user.
Related Questions on Average

Which of the following is NOT a common input validation technique for form data?

A). Regular Expressions

B). Whitelisting

C). Blacklisting

D). Tokenization

Which of the following is a best practice for preventing SQL Injection when executing SQL queries in PHP?

A). Use Parameterized Queries

B). Store Passwords in Plain Text

C). Use addslashes() Function

D). Disable Error Reporting

Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?

A). mysqli_real_escape_string()

B). htmlspecialchars()

C). filter_var()

D). htmlentities()

What is the purpose of using HTTPS (HTTP Secure) in web applications?

A). Encrypting Data

B). Authenticating Users

C). Preventing XSS Attacks

D). Optimizing Page Load Speed

Which of the following HTTP methods is considered safe and idempotent, making it suitable for form submissions?

A). POST

B). GET

C). PUT

D). DELETE

Which of the following is a secure method for storing passwords in a database?

A). Hashing

B). Encryption

C). Salting

D). All of the above

Which PHP function is commonly used to sanitize input data from a form to prevent XSS attacks?

A). htmlspecialchars()

B). htmlentities()

C). strip_tags()

D). filter_var()

What is the purpose of input validation in web forms?

A). Ensuring Data Integrity

B). Enhancing User Experience

C). Preventing XSS Attacks

D). Enforcing Password Policies

Which PHP function is commonly used to validate email addresses submitted through a form?

A). filter_var()

B). preg_match()

C). validate_email()

D). email_check()

Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?

A). SameSite

B). Cache-Control

C). Access-Control-Allow-Origin

D). Content-Security-Policy