Q
Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?

Answer & Solution

Answer: Option A
Solution:
The SameSite attribute in HTTP headers instructs web browsers to restrict cookie sharing to the same site, helping prevent CSRF and XSS attacks.
Related Questions on Average

Which PHP function is commonly used to sanitize input data from a form to prevent SQL injection?

A). mysqli_real_escape_string()

B). htmlspecialchars()

C). filter_var()

D). htmlentities()

What is the purpose of using prepared statements when interacting with databases in PHP?

A). Preventing SQL Injection

B). Improving Performance

C). Encrypting Data

D). Enforcing Data Integrity

Which PHP function is commonly used to sanitize input data from a form to prevent XSS attacks?

A). htmlspecialchars()

B). htmlentities()

C). strip_tags()

D). filter_var()

Which of the following is a common security vulnerability associated with form data submission?

A). SQL Injection

B). Form Spamming

C). Broken Authentication

D). Clickjacking

What is the purpose of session management in web applications?

A). Maintaining User State

B). Encrypting Data

C). Preventing SQL Injection

D). Validating Form Data

What is the purpose of input validation in web forms?

A). Ensuring Data Integrity

B). Enhancing User Experience

C). Preventing XSS Attacks

D). Enforcing Password Policies

Which PHP function is used to generate a random CSRF token for form submissions?

A). bin2hex()

B). uniqid()

C). md5()

D). openssl_random_pseudo_bytes()

Which of the following is a best practice for preventing SQL Injection when executing SQL queries in PHP?

A). Use Parameterized Queries

B). Store Passwords in Plain Text

C). Use addslashes() Function

D). Disable Error Reporting

Which of the following is a secure method for storing passwords in a database?

A). Hashing

B). Encryption

C). Salting

D). All of the above

Which of the following is NOT a common security vulnerability associated with file uploads in web applications?

A). File Inclusion

B). File Upload Vulnerability

C). Path Traversal

D). Cross-Site Request Forgery