Q
Which of the following is a secure method for storing passwords in a database?

Answer & Solution

Answer: Option A
Solution:
Hashing passwords involves converting them into irreversible hashed values, making it secure even if the database is compromised.
Related Questions on Average

Which PHP function is commonly used to sanitize input data from a form to prevent XSS attacks?

A). htmlspecialchars()

B). htmlentities()

C). strip_tags()

D). filter_var()

What is the purpose of using HTTPS (HTTP Secure) in web applications?

A). Encrypting Data

B). Authenticating Users

C). Preventing XSS Attacks

D). Optimizing Page Load Speed

Which PHP function is commonly used to check if a form field is empty?

A). empty()

B). isset()

C). is_empty()

D). is_null()

What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?

A). CSRF Token

B). Session Management

C). Secure Cookies

D). HTTPS

Which of the following is a best practice for preventing SQL Injection when executing SQL queries in PHP?

A). Use Parameterized Queries

B). Store Passwords in Plain Text

C). Use addslashes() Function

D). Disable Error Reporting

Which of the following is NOT a common security vulnerability associated with file uploads in web applications?

A). File Inclusion

B). File Upload Vulnerability

C). Path Traversal

D). Cross-Site Request Forgery

Which of the following is NOT a common input validation technique for form data?

A). Regular Expressions

B). Whitelisting

C). Blacklisting

D). Tokenization

Which of the following is a common security vulnerability associated with form data submission?

A). SQL Injection

B). Form Spamming

C). Broken Authentication

D). Clickjacking

Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?

A). mysqli_real_escape_string()

B). htmlspecialchars()

C). filter_var()

D). htmlentities()

Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?

A). SameSite

B). Cache-Control

C). Access-Control-Allow-Origin

D). Content-Security-Policy