Q
What security measure helps prevent form spamming by distinguishing between human users and bots?

Answer & Solution

Answer: Option A
Solution:
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) presents challenges that are easy for humans to solve but difficult for bots, preventing automated form submissions.
Related Questions on Average

Which of the following is NOT a common input validation technique for form data?

A). Regular Expressions

B). Whitelisting

C). Blacklisting

D). Tokenization

What is the purpose of session management in web applications?

A). Maintaining User State

B). Encrypting Data

C). Preventing SQL Injection

D). Validating Form Data

Which PHP function is used to generate a random CSRF token for form submissions?

A). bin2hex()

B). uniqid()

C). md5()

D). openssl_random_pseudo_bytes()

Which PHP function is commonly used to validate email addresses submitted through a form?

A). filter_var()

B). preg_match()

C). validate_email()

D). email_check()

What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?

A). CSRF Token

B). Session Management

C). Secure Cookies

D). HTTPS

Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?

A). SameSite

B). Cache-Control

C). Access-Control-Allow-Origin

D). Content-Security-Policy

What is the purpose of input validation in web forms?

A). Ensuring Data Integrity

B). Enhancing User Experience

C). Preventing XSS Attacks

D). Enforcing Password Policies

What is the purpose of using prepared statements when interacting with databases in PHP?

A). Preventing SQL Injection

B). Improving Performance

C). Encrypting Data

D). Enforcing Data Integrity

What does XSS stand for in the context of web security?

A). Cross-Site Scripting

B). XML Secure Socket

C). External Server Session

D). Cross-Site Sanitization

Which of the following is NOT a common security vulnerability associated with file uploads in web applications?

A). File Inclusion

B). File Upload Vulnerability

C). Path Traversal

D). Cross-Site Request Forgery