Which of the following is NOT a common input validation technique for form data?
A). Regular Expressions
B). Whitelisting
C). Blacklisting
D). Tokenization
Which of the following is a best practice for preventing SQL Injection when executing SQL queries in PHP?
A). Use Parameterized Queries
B). Store Passwords in Plain Text
C). Use addslashes() Function
D). Disable Error Reporting
Which of the following is NOT a common security vulnerability associated with file uploads in web applications?
A). File Inclusion
B). File Upload Vulnerability
C). Path Traversal
D). Cross-Site Request Forgery
What is the purpose of using HTTPS (HTTP Secure) in web applications?
A). Encrypting Data
B). Authenticating Users
C). Preventing XSS Attacks
D). Optimizing Page Load Speed
What is the primary purpose of form data validation in web applications?
A). Enhancing user experience
B). Preventing security vulnerabilities
C). Optimizing server performance
D). Improving search engine ranking
What is the purpose of input validation in web forms?
A). Ensuring Data Integrity
B). Enhancing User Experience
C). Preventing XSS Attacks
D). Enforcing Password Policies
Which PHP function is commonly used to check if a form field is empty?
A). empty()
B). isset()
C). is_empty()
D). is_null()
Which HTTP header instructs web browsers to limit the scope of cookies to a specific domain?
A). SameSite
B). Cache-Control
C). Access-Control-Allow-Origin
D). Content-Security-Policy
Which PHP function is commonly used to validate email addresses submitted through a form?
A). filter_var()
B). preg_match()
C). validate_email()
D). email_check()
What security mechanism prevents Cross-Site Request Forgery (CSRF) attacks by generating and validating unique tokens for each form submission?
A). CSRF Token
B). Session Management
C). Secure Cookies
D). HTTPS