Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CAP Certified AppSec Practitioner Exam Questions and Answers

Questions 4

Multifactor authentication will NOT be able to prevent:

Options:

A.

Cross-Site Scripting Vulnerability

B.

Cross-Site Request Forgery Vulnerability

C.

Path Traversal Vulnerability

D.

All of the above

Buy Now
Questions 5

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /upload.php HTTP/1.1

Host: example.com

Cookie: session=xyz123;JSESSIONID=abc123

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW

Content-Length: 12345

Connection: keep-alive

Content-Disposition: form-data; name="avatar"; filename="malicious.php"

Content-Type: image/jpeg

phpinfo();

?>

Options:

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

File Upload Vulnerability

D.

Server-Side Request Forgery

Buy Now
Questions 6

Which SQL function can be used to read the contents of a file during manual exploitation of the SQL injection vulnerability in a MySQL database?

Options:

A.

READ_FILE()

B.

LOAD_FILE()

C.

FETCH_FILE()

D.

GET_FILE()

Buy Now
Questions 7

Which of the following is NOT an asymmetric key encryption algorithm?

Options:

A.

AES

B.

RSA

C.

Diffie-Hellman

D.

DSA

Buy Now
Questions 8

A robots.txt file tells the search engine crawlers about the URLs which the crawler can access on your site. Which of the following is true about robots.txt?

Options:

A.

Developers must not list any sensitive files and directories in this file

B.

Developers must list all sensitive files and directories in this file to secure them

C.

Both A and B

D.

None of the above

Buy Now
Questions 9

While performing a security audit of a web application, you discovered an exposed docker-compose.yml file. What is the significance of this file and what data can be found in it?

Options:

A.

The docker-compose.yml file is a YAML file that contains the application source code.

B.

The docker-compose.yml file is a YAML file that contains the server logs and user session information including but not limited to admin users.

C.

The docker-compose.yml file is a YAML file that is used to define the services, networks, and volumes required for a Docker application. It specifies the configuration and dependencies for all containers in the application, including their network settings and container volumes.

D.

The docker-compose.yml file is a YAML file that contains the configuration of load balancers and firewalls.

Buy Now
Questions 10

Which of the following is a common attack in the context of SAML security?

Options:

A.

XML Signature Wrapping Attack

B.

XML External Entity Injection

C.

Assertion Replay Attack

D.

All of the above

Buy Now
Questions 11

Observe the HTTP request below and identify the vulnerability attempted.

GET /help.php?file=../../../etc/passwd HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

Options:

A.

Cross-Site Request Forgery Vulnerability

B.

Path Traversal Vulnerability

C.

Code Injection Vulnerability

D.

All of the above

Buy Now
Questions 12

Which of the following HTTP response header prevents the client from caching the HTTP response in the most secure manner?

Options:

A.

Cache-Control: no-cache, no-store

B.

Secure-Cache: Enabled

C.

Cache-Control: Private

D.

Content-Security-Policy: no-cache, no-store

Buy Now
Questions 13

Which of the following is correct?

Options:

A.

The browser contains the private key of all known Certifying Authorities (CA) and based on that, it differentiates between a valid and an invalid TLS Certificate

B.

The browser contains the public key of all known Certifying Authorities (CA) and based on that it is able to differentiate between a valid and an invalid TLS Certificate

C.

The browser contains both the public and private key of all known Certifying Authorities (CA) and based on that it is able to differentiate between a valid and an invalid TLS Certificate

D.

The browser does not have any mechanism to validate the TLS Certificate

Buy Now
Questions 14

Based on the below-mentioned code snippet, the 'filename' variable is vulnerable to which of the following attacks?

import os

filename = input("Enter the file name:")

path = "/var/www/html/files/" + filename

content = ""

with open(path, 'r') as file:

content = file.read()

print("File content:\n", content)

Options:

A.

Path Traversal

B.

Remote Code Execution

C.

Both A and B

D.

None of the above

Buy Now
Questions 15

Your application is hosting JavaScript from a third-party website as shown in the snippet below.

Which of the following is true regarding the code snippet?

Options:

A.

The code snippet will perform validations for Cross-Site Scripting attacks

B.

The code snippet will perform validations for Cross-Site Request Forgery attacks

C.

The code snippet will perform Subresource Integrity (SRI) checks

D.

The code snippet will perform validations for Outdated Javascript checks

Buy Now
Questions 16

Which is the most effective way of input validation to prevent Cross-Site Scripting attacks?

Options:

A.

Blacklisting HTML and other harmful characters

B.

Whitelisting and allowing only trusted input

C.

Using a Web Application Firewall (WAF)

D.

Marking Cookie as HttpOnly

Buy Now
Questions 17

Based on the screenshot below, which of the following statements is true?

HTTP/1.1 200 OK

Accept-Ranges: bytes

Age: 359987

Cache-Control: max-age=604800

Content-Type: text/html; charset=UTF-8

Date: Fri, 02 Dec 2022 18:33:05 GMT

Expires: Fri, 09 Dec 2022 18:33:05 GMT

Last-Modified: Mon, 28 Nov 2022 14:33:18 GMT

Server: Microsoft-IIS/8.0

X-AspNet-Version: 2.0.50727

Vary: Accept-Encoding

X-Powered-By: ASP.NET

Content-Length: 1256

Options:

A.

The application is using an outdated server technology

B.

The application is disclosing the server version

C.

The application is disclosing the version of the framework used

D.

All of the above

Buy Now
Questions 18

The DNS entries forwww.ironman.com andwww.hulk.com both point to the same IP address i.e., 1.3.3.7. How does the web server know which web application is being requested by the end user's browser?

Options:

A.

The web server inspects the HTTP "Host" header sent by the client.

B.

The web server inspects the cookies sent by the client.

C.

The web server inspects the client's SSL certificate.

D.

The web server uses a reverse DNS lookup of the client's IP address.

Buy Now
Exam Code: CAP
Exam Name: Certified AppSec Practitioner Exam
Last Update: Apr 2, 2025
Questions: 60
CAP pdf

CAP PDF

$25.5  $84.99
CAP Engine

CAP Testing Engine

$30  $99.99
CAP PDF + Engine

CAP PDF + Testing Engine

$40.5  $134.99