Easter Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > The SecOps Group > AppSec Practitioner > CAP

CAP Certified AppSec Practitioner Exam Question and Answers

Question # 4

Based on the below HTTP request, which of the following statements is correct?

POST /changepassword HTTP/2

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: same-origin

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Content-Length: 95

new_password=usher!@22&confirm_password=usher!@22

A.

The change password feature does not validate the user

B.

The change password feature uses basic authorization

C.

The change password feature is vulnerable to Cross-Site Request Forgery attack

D.

All of the above

Full Access
Question # 5

Which of the following is considered as a safe password?

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

Full Access
Question # 6

Based on the screenshot below, which of the following statements is true?

HTTP/1.1 200 OK

Accept-Ranges: bytes

Age: 359987

Cache-Control: max-age=604800

Content-Type: text/html; charset=UTF-8

Date: Fri, 02 Dec 2022 18:33:05 GMT

Expires: Fri, 09 Dec 2022 18:33:05 GMT

Last-Modified: Mon, 28 Nov 2022 14:33:18 GMT

Server: Microsoft-IIS/8.0

X-AspNet-Version: 2.0.50727

Vary: Accept-Encoding

X-Powered-By: ASP.NET

Content-Length: 1256

A.

The application is using an outdated server technology

B.

The application is disclosing the server version

C.

The application is disclosing the version of the framework used

D.

All of the above

Full Access
Question # 7

Multifactor authentication will NOT be able to prevent:

A.

Cross-Site Scripting Vulnerability

B.

Cross-Site Request Forgery Vulnerability

C.

Path Traversal Vulnerability

D.

All of the above

Full Access
Question # 8

Which of the following is NOT a Server-Side attack?

A.

OS Code Injection

B.

Cross-Site Request Forgery

C.

SQL Injection

D.

Directory Traversal Attack

Full Access
Question # 9

Based on the below request/response, which of the following statements is true?

Send

GET /dashboard.php?purl=http://attacker.com HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 302 Found 2022-12-03 17:38:18 GMT

Date: Sat, 03 Dec 2022 17:38:18 GMT

Server: Apache/2.4.54 (Unix) OpenSSL/1.0.2k-fips PHP/8.0.25

X-Powered-By: PHP/8.0.25

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Connection: keep-alive

Location: http://attacker.com

Set-Cookie: JSESSIONID=38C5ECV10785B53AF29816E92E2E50; Path=/; HttpOnly

A.

Application is likely to be vulnerable to Open Redirection vulnerability

B.

Application is vulnerable to Cross-Site Request Forgery vulnerability

C.

Application uses an insecure protocol

D.

All of the above

Full Access
Question # 10

Your application is hosting JavaScript from a third-party website as shown in the snippet below.

Which of the following is true regarding the code snippet?

A.

The code snippet will perform validations for Cross-Site Scripting attacks

B.

The code snippet will perform validations for Cross-Site Request Forgery attacks

C.

The code snippet will perform Subresource Integrity (SRI) checks

D.

The code snippet will perform validations for Outdated Javascript checks

Full Access
Question # 11

In the screenshot below, which of the following is incorrect?

Target: https://example.com

HTTP/1.1 404 Not Found

Date: Fri, 09 Dec 2022 18:03:49 GMT

Server: Apache

Vary: Cookie

X-Powered-By: PHP/5.4.5-5

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Cookie: JSESSIONID=1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789; secure; HttpOnly; SameSite=None

A.

The application discloses the framework name and version

B.

The application reveals user-agent details

C.

A cookie is set with HttpOnly and a Secure flag

D.

The application accepts insecure protocol

Full Access
Question # 12

In the context of the Race Condition vulnerability, which of the following statements is true?

A.

A situation that occurs when two threads access the same resource at the same time.

B.

A situation that occurs when two threads access different resources at the same time.

C.

A situation that occurs when a single thread unpredictably accesses two resources.

D.

A situation that occurs when a single thread predictably accesses two resources.

Full Access
Question # 13

What is the full form of SAML?

A.

Security Assertion Markup Language

B.

Security Authorization Markup Language

C.

Security Assertion Management Language

D.

Secure Authentication Markup Language

Full Access
Question # 14

Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web applications by adding a URL-encoded null byte character to the user-supplied data. Which of the following is a URL-encoded representation of a null byte?

A.

%01

B.

%10

C.

%25

D.

%00

Full Access
Question # 15

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

In the scenario described above, which of the following is correct?

A.

There is no urgency to renew the certificate as the communication is still over TLS

B.

There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack

Full Access
Question # 16

In the context of a Dependency Confusion Attack, which of the following files is analyzed for determining potential private packages?

A.

package.json

B.

requirements.txt

C.

Both A and B

D.

None of the above

Full Access
Question # 17

Which of the following hashing algorithms is considered to be the most secure amongst these?

A.

SHA-0

B.

MD5

C.

SHA-1

D.

Bcrypt

Full Access
Question # 18

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. There are two fixes:

(Bob’s Fix): In order to fix this vulnerability, a developer called Bob devised a fix so that the URL does not disclose the numeric value of the order_id but uses a SHA1 hash of the order_id in the URL, such as:

https://example.com/?order_id=1ff0fe6f1599536d1326418124a261bc98b8ea1

Note: that the SHA1 value of 53870 is 1ff0fe6f1599536d1326418124a261bc98b8ea1

(John’s Fix): Another developer called John devised a different fix so that the URL does not disclose the numeric value of the order_id and uses a Base64 encoded value of the order_id in the URL, such as:

https://example.com/?order_id=NTM4NzA=

Note: that the Base64 encoded value of 53870 is NTM4NzA=

Which of the following is correct?

A.

Both solutions are adequate to fix the problem

B.

Both solutions are inadequate and the vulnerability is still not fixed

C.

Only John’s solution fixes the problem

D.

Only Bob’s solution fixes the problem

Full Access