In OAuth, what is the difference between an access token and a refresh token?

  • A string representing the resource owner's authorization grant
  • A token issued to the client to access protected resources
  • A token that contains information about the user
  • A token used to obtain a new access token
In OAuth, an access token is used to access a resource, while a refresh token is used to obtain a new access token when the original one expires. The refresh token provides a way to maintain access without requiring the user to re-authenticate.

Which directory contains the primary index.php file that serves as the entry point for a CodeIgniter application?

  • application
  • public
  • root
  • system
The primary index.php file that serves as the entry point for a CodeIgniter application is located in the 'public' directory. This file initializes the framework and routes incoming requests to the appropriate controllers. It is essential for the proper functioning of the CodeIgniter application.

What does XSS stand for in web security?

  • Cross-Site Authentication
  • Cross-Site Request Forgery
  • Cross-Site Scripting
  • Cross-Site Server
Cross-Site Scripting (XSS) is a security vulnerability that allows attackers to inject malicious scripts into web pages. It can occur when a web application does not properly validate user input, allowing the attacker to execute scripts in the victim's browser.

In MVC architecture, which component is responsible for handling user inputs?

  • Controller
  • Library
  • Model
  • View
In MVC architecture, the 'Controller' component is responsible for handling user inputs. It receives user requests, processes them, and interacts with the Model and View components accordingly. This separation of concerns helps maintain code organization and enhances code reusability.

To enhance security, a developer implements a feature that checks the referrer header and token validity. This technique is known as ________.

  • CSRF Protection
  • Cross-Origin Security
  • Header Validation
  • Token Authentication
This technique is known as CSRF (Cross-Site Request Forgery) protection, where the referrer header and token validity are checked to prevent unauthorized form submissions.

To retrieve database error messages in CodeIgniter, use the ________ function.

  • db_error()
  • error_msg()
  • get_error()
  • last_error()
In CodeIgniter, to retrieve database error messages, the correct function is db_error(). This function allows you to get the last database error that occurred.

For advanced caching in CodeIgniter, the cache adapter is set in the ________ configuration file.

  • cache.php
  • config.php
  • database.php
  • routes.php
CodeIgniter uses the config.php file to set up various configurations, including the cache adapter for advanced caching.

The function name in a CodeIgniter Helper file typically ends with the suffix ________.

  • _helper
  • _function
  • _lib
  • _code
The correct option is "a) _helper". In CodeIgniter, Helper function names usually end with the "_helper" suffix to distinguish them as Helper functions.

Explain the role of the 'hooks' directory in advanced CodeIgniter applications.

  • It allows extending and modifying the framework.
  • It houses global helper functions for the app.
  • It is a directory for managing session data.
  • It is used for storing template files.
The 'hooks' directory in CodeIgniter enables developers to extend and modify the framework's behavior by defining custom hooks. This is especially useful for advanced applications requiring specific customizations.

In a scenario where a view needs to display dynamic data based on user inputs, the best practice in CodeIgniter is to ________.

  • Embed raw user input directly in the view.
  • Perform data processing and manipulation in the controller and pass the processed data to the view.
  • Use $this->input->post() directly in the view file.
  • Use inline PHP code to fetch data directly from the database in the view.
It is a best practice in CodeIgniter to keep the views simple and responsible for presentation only. Therefore, data processing and manipulation based on user inputs should be done in the controller, and the processed data should be passed to the view. This enhances code maintainability and separation of concerns.