Which of the following HTTP methods is considered safe and idempotent, making it suitable for form submissions?
A). POST
B). GET
C). PUT
D). DELETE
Which of the following is a best practice for preventing SQL Injection when executing SQL queries in PHP?
A). Use Parameterized Queries
B). Store Passwords in Plain Text
C). Use addslashes() Function
D). Disable Error Reporting
What is the primary purpose of form data validation in web applications?
A). Enhancing user experience
B). Preventing security vulnerabilities
C). Optimizing server performance
D). Improving search engine ranking
Which of the following is NOT a common input validation technique for form data?
A). Regular Expressions
B). Whitelisting
C). Blacklisting
D). Tokenization
What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?
A). CSRF Token
B). Session Management
C). Secure Cookies
D). HTTPS
What security measure helps prevent form spamming by distinguishing between human users and bots?
A). CAPTCHA
B). HTTPS
C). CSRF Token
D). Two-Factor Authentication
Which PHP function is commonly used to validate email addresses submitted through a form?
A). filter_var()
B). preg_match()
C). validate_email()
D). email_check()
What does XSS stand for in the context of web security?
A). Cross-Site Scripting
B). XML Secure Socket
C). External Server Session
D). Cross-Site Sanitization
Which PHP function is commonly used to check if a form field is empty?
A). empty()
B). isset()
C). is_empty()
D). is_null()
Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?
A). mysqli_real_escape_string()
B). htmlspecialchars()
C). filter_var()
D). htmlentities()