To enhance security, a developer implements a feature that checks the referrer header and token validity. This technique is known as ________.

  • CSRF Protection
  • Cross-Origin Security
  • Header Validation
  • Token Authentication
This technique is known as CSRF (Cross-Site Request Forgery) protection, where the referrer header and token validity are checked to prevent unauthorized form submissions.

To retrieve database error messages in CodeIgniter, use the ________ function.

  • db_error()
  • error_msg()
  • get_error()
  • last_error()
In CodeIgniter, to retrieve database error messages, the correct function is db_error(). This function allows you to get the last database error that occurred.

For advanced caching in CodeIgniter, the cache adapter is set in the ________ configuration file.

  • cache.php
  • config.php
  • database.php
  • routes.php
CodeIgniter uses the config.php file to set up various configurations, including the cache adapter for advanced caching.

The function name in a CodeIgniter Helper file typically ends with the suffix ________.

  • _helper
  • _function
  • _lib
  • _code
The correct option is "a) _helper". In CodeIgniter, Helper function names usually end with the "_helper" suffix to distinguish them as Helper functions.

Explain the role of the 'hooks' directory in advanced CodeIgniter applications.

  • It allows extending and modifying the framework.
  • It houses global helper functions for the app.
  • It is a directory for managing session data.
  • It is used for storing template files.
The 'hooks' directory in CodeIgniter enables developers to extend and modify the framework's behavior by defining custom hooks. This is especially useful for advanced applications requiring specific customizations.

In a scenario where a view needs to display dynamic data based on user inputs, the best practice in CodeIgniter is to ________.

  • Embed raw user input directly in the view.
  • Perform data processing and manipulation in the controller and pass the processed data to the view.
  • Use $this->input->post() directly in the view file.
  • Use inline PHP code to fetch data directly from the database in the view.
It is a best practice in CodeIgniter to keep the views simple and responsible for presentation only. Therefore, data processing and manipulation based on user inputs should be done in the controller, and the processed data should be passed to the view. This enhances code maintainability and separation of concerns.

Which HTTP header is essential for mitigating CSRF attacks?

  • Anti-CSRF
  • CSRF-Token
  • X-CSRF-Token
  • X-Frame-Options
CSRF attacks can be mitigated by using a unique token associated with the user session. This token is typically sent in a custom HTTP header, such as X-CSRF-Token. It helps verify the legitimacy of the request and prevents attackers from forging requests on behalf of the user.

In terms of security, why is relying solely on client-side validation not advisable?

  • It can be easily bypassed by malicious users
  • It conflicts with browser settings
  • It requires additional server resources
  • It slows down form submission
Relying solely on client-side validation is not advisable for security reasons because it can be easily bypassed by malicious users. Client-side validation is performed on the user's browser, and a knowledgeable attacker can manipulate or disable it. Server-side validation is essential to ensure that data integrity and security are maintained.

What does XSS stand for in web security?

  • Cross-Site Authentication
  • Cross-Site Request Forgery
  • Cross-Site Scripting
  • Cross-Site Server
Cross-Site Scripting (XSS) is a security vulnerability that allows attackers to inject malicious scripts into web pages. It can occur when a web application does not properly validate user input, allowing the attacker to execute scripts in the victim's browser.

The technique of ________ is essential in the Email Class to avoid being flagged as spam.

  • CAPTCHA Verification
  • DKIM (DomainKeys Identified Mail)
  • Email Encryption
  • SPF (Sender Policy Framework)
The technique of DKIM (DomainKeys Identified Mail) is essential in the Email Class to add a digital signature to outgoing emails. This signature helps verify the authenticity of the sender, reducing the chances of emails being flagged as spam by recipient servers.