Q
What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?

Answer & Solution

Answer: Option A
Solution:
CSRF Tokens are unique tokens generated for each session or form submission, ensuring that the request originates from the intended user and not an attacker.
Related Questions on Average

Which of the following is NOT a common security vulnerability associated with file uploads in web applications?

A). File Inclusion

B). File Upload Vulnerability

C). Path Traversal

D). Cross-Site Request Forgery

Which of the following HTTP methods is considered safe and idempotent, making it suitable for form submissions?

A). POST

B). GET

C). PUT

D). DELETE

Which of the following is a best practice for preventing SQL Injection when executing SQL queries in PHP?

A). Use Parameterized Queries

B). Store Passwords in Plain Text

C). Use addslashes() Function

D). Disable Error Reporting

Which PHP function is used to generate a random CSRF token for form submissions?

A). bin2hex()

B). uniqid()

C). md5()

D). openssl_random_pseudo_bytes()

Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?

A). mysqli_real_escape_string()

B). htmlspecialchars()

C). filter_var()

D). htmlentities()

Which of the following is a secure method for storing passwords in a database?

A). Hashing

B). Encryption

C). Salting

D). All of the above

What security measure helps prevent form spamming by distinguishing between human users and bots?

A). CAPTCHA

B). HTTPS

C). CSRF Token

D). Two-Factor Authentication

What is the purpose of using prepared statements when interacting with databases in PHP?

A). Preventing SQL Injection

B). Improving Performance

C). Encrypting Data

D). Enforcing Data Integrity

What is the primary purpose of form data validation in web applications?

A). Enhancing user experience

B). Preventing security vulnerabilities

C). Optimizing server performance

D). Improving search engine ranking

Which of the following is a common security vulnerability associated with form data submission?

A). SQL Injection

B). Form Spamming

C). Broken Authentication

D). Clickjacking