Which of the following is NOT a common input validation technique for form data?
A). Regular Expressions
B). Whitelisting
C). Blacklisting
D). Tokenization
Which of the following HTTP methods is considered safe and idempotent, making it suitable for form submissions?
A). POST
B). GET
C). PUT
D). DELETE
Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?
A). mysqli_real_escape_string()
B). htmlspecialchars()
C). filter_var()
D). htmlentities()
Which PHP function is used to generate a random CSRF token for form submissions?
A). bin2hex()
B). uniqid()
C). md5()
D). openssl_random_pseudo_bytes()
What is the primary purpose of form data validation in web applications?
A). Enhancing user experience
B). Preventing security vulnerabilities
C). Optimizing server performance
D). Improving search engine ranking
Which of the following is a common security vulnerability associated with form data submission?
A). SQL Injection
B). Form Spamming
C). Broken Authentication
D). Clickjacking
Which PHP function is commonly used to check if a form field is empty?
A). empty()
B). isset()
C). is_empty()
D). is_null()
What is the purpose of session management in web applications?
A). Maintaining User State
B). Encrypting Data
C). Preventing SQL Injection
D). Validating Form Data
What is the purpose of using HTTPS (HTTP Secure) in web applications?
A). Encrypting Data
B). Authenticating Users
C). Preventing XSS Attacks
D). Optimizing Page Load Speed
Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?
A). SameSite
B). Cache-Control
C). Access-Control-Allow-Origin
D). Content-Security-Policy