Which of the following is a secure method for storing passwords in a database?
A). Hashing
B). Encryption
C). Salting
D). All of the above
Which of the following HTTP methods is considered safe and idempotent, making it suitable for form submissions?
A). POST
B). GET
C). PUT
D). DELETE
Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?
A). mysqli_real_escape_string()
B). htmlspecialchars()
C). filter_var()
D). htmlentities()
Which PHP function is used to generate a random CSRF token for form submissions?
A). bin2hex()
B). uniqid()
C). md5()
D). openssl_random_pseudo_bytes()
Which of the following is NOT a common security vulnerability associated with file uploads in web applications?
A). File Inclusion
B). File Upload Vulnerability
C). Path Traversal
D). Cross-Site Request Forgery
What security measure helps prevent form spamming by distinguishing between human users and bots?
A). CAPTCHA
B). HTTPS
C). CSRF Token
D). Two-Factor Authentication
What is the purpose of using HTTPS (HTTP Secure) in web applications?
A). Encrypting Data
B). Authenticating Users
C). Preventing XSS Attacks
D). Optimizing Page Load Speed
Which of the following is a common security vulnerability associated with form data submission?
A). SQL Injection
B). Form Spamming
C). Broken Authentication
D). Clickjacking
Which PHP function is commonly used to validate email addresses submitted through a form?
A). filter_var()
B). preg_match()
C). validate_email()
D). email_check()
What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?
A). CSRF Token
B). Session Management
C). Secure Cookies
D). HTTPS