CSS QUIZ 8

 1.Upper case and lower-case letters, numbers and symbols

computer system security quiz 8 solution

                        computer      system security quiz 8 solutio

 

 


 Q:1. Password should be combination of ____. (according to the video lecture).

1.Lower case letters only

2.Memorable names and dates

3.Upper case and lower-case letters, numbers and non letter characters

4.Upper case and lower-case letters, numbers and symbols


Answer:- 4.Upper case and lower-case letters, numbers and symbols

Reason:- The key aspects of a strong password are length (the longer the better); a mix of letters (upper and lower case), numbers, and symbols, no ties to your personal information, and no dictionary words


Q:2. The cookies we use, are sent with ______, which in general, _____ the performance.

1.only when requested,improves

2.every request, degrades

3.extra information, is useless for

4.None of the mentioned


Answer:- 2.every request, degrades


Reason :- typically cookies are used for a variety of purposes: ... Cookies impact performance because every time you make a request to a ... an HTML file, a CSS file, an image) the browser will send the cookie in the request to the server. ... request becomes a little bigger and thus performance begins to degrade.

https://youtu.be/IRfa4p0em0E

please subscribe this channel for further answers of the quiz


Q:3. Which of the following header is used to create cookie ?

1.Create-Cookie

2.Init-Cookie

3.Set-Cookie

4.Start-Cookie


Answer:- 3.Set-Cookie


Reason:- After receiving an HTTP request, a server can send one or more Set-Cookie headers with the response. The cookie is usually stored by the browser, and then the cookie is sent with requests made to the same server inside a Cookie HTTP header.


Q:4. _______ is an attack to inject code, in which malicious SQL code is passed to an instance of SQL Server from ______.

1.SQL injection, user input field

2.code injection, another server

3.both 1 and 2

4.None of the above.


Answer:-1.SQL injection, user input field.


Reason:- SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).


Q:5. How to prevent SQL injection ?


1.Use parameterized / prepared SQL

2.use string concatenated query

3.Both A and B

4.None of the above


Answer:- 3.Both A and B.


Reason:- The best way to prevent SQL Injections is to use safe programming functions that make SQL Injections impossible: parameterized queries (prepared statements) and stored procedures. Every major programming language currently has such safe functions and every developer should only use such safe functions to work with the database.

Comments

Popular posts from this blog

COMMOM BUS SYSTEM USING MULTIPLEXER

CSS QUIZ 9 ANSWERS

HOW BASIC COMPUTER WORKS USING COMMON BUS SYSTEM