Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

The SecOps Group CAP Certified AppSec Practitioner Exam Exam Practice Test

Page: 1 / 6
Total 60 questions

Certified AppSec Practitioner Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

In the scenario described above, which of the following is correct?

Options:

A.

There is no urgency to renew the certificate as the communication is still over TLS

B.

There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack

Question 2

Under the same-origin policy (also SOP), a web browser permits scripts contained in a web page to access data in another web page, but only if both web pages have the same origin. Which of the following pages are in the same origin as that of the below URL?

Options:

A.

1 Only

B.

1 and 2

C.

1, 3 and 4

D.

None of the above

Question 3

The application is vulnerable to Cross-Site Scripting. Which of the following exploitation is NOT possible at all?

Options:

A.

Steal the user's session identifier stored on a non HttpOnly cookie

B.

Steal the contents from the web page

C.

Steal the contents from the application's database

D.

Steal the contents from the user's keystrokes using keyloggers

Question 4

Based on the screenshot above, which of the following is the most true?

Screenshot

![Login Form]

coder@viewer

User does not exist

[Password field]

Forget password?

[Login button]

Not yet member? Sign now

Options:

A.

The application is vulnerable to username enumeration

B.

The application is vulnerable to brute-force attacks

C.

The application does not enforce a strong password policy

D.

None of the above

Question 5

Which of the following security attributes ensures that the browser only sends the cookie over a TLS (encrypted) channel?

Options:

A.

Secure

B.

HttpOnly

C.

No_XSS

D.

None of the above

Question 6

In the context of the Race Condition vulnerability, which of the following statements is true?

Options:

A.

A situation that occurs when two threads access the same resource at the same time.

B.

A situation that occurs when two threads access different resources at the same time.

C.

A situation that occurs when a single thread unpredictably accesses two resources.

D.

A situation that occurs when a single thread predictably accesses two resources.

Question 7

Which of the following is a common attack in the context of SAML security?

Options:

A.

XML Signature Wrapping Attack

B.

XML External Entity Injection

C.

Assertion Replay Attack

D.

All of the above

Question 8

In the screenshot below, which of the following is incorrect?

Target:

HTTP/1.1 404 Not Found

Date: Fri, 09 Dec 2022 18:03:49 GMT

Server: Apache

Vary: Cookie

X-Powered-By: PHP/5.4.5-5

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Cookie: JSESSIONID=1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789; secure; HttpOnly; SameSite=None

Options:

A.

The application discloses the framework name and version

B.

The application reveals user-agent details

C.

A cookie is set with HttpOnly and a Secure flag

D.

The application accepts insecure protocol

Question 9

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. This attack is known as:

Options:

A.

Insecure Direct Object Reference

B.

Session Poisoning

C.

Session Riding OR Cross-Site Request Forgery

D.

Server-Side Request Forgery

Question 10

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /upload.php HTTP/1.1

Host: example.com

Cookie: session=xyz123;JSESSIONID=abc123

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW

Content-Length: 12345

Connection: keep-alive

Content-Disposition: form-data; name="avatar"; filename="malicious.php"

Content-Type: image/jpeg

phpinfo();

?>

Options:

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

File Upload Vulnerability

D.

Server-Side Request Forgery

Question 11

What is the full form of SAML?

Options:

A.

Security Assertion Markup Language

B.

Security Authorization Markup Language

C.

Security Assertion Management Language

D.

Secure Authentication Markup Language

Question 12

Your application is hosting JavaScript from a third-party website as shown in the snippet below.

Which of the following is true regarding the code snippet?

Options:

A.

The code snippet will perform validations for Cross-Site Scripting attacks

B.

The code snippet will perform validations for Cross-Site Request Forgery attacks

C.

The code snippet will perform Subresource Integrity (SRI) checks

D.

The code snippet will perform validations for Outdated Javascript checks

Question 13

Which of the following is NOT an asymmetric key encryption algorithm?

Options:

A.

AES

B.

RSA

C.

Diffie-Hellman

D.

DSA

Question 14

Which of the following is considered as a safe password?

Options:

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

Question 15

Which of the following SSL/TLS protocols are considered to be insecure?

Options:

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2 and TLSv1.3

Question 16

In the context of NoSQL injection, which of the following is correct?

Statement A: NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance and scaling benefits. Yet these databases are still potentially vulnerable to injection attacks, even if they aren’t using the traditional SQL syntax.

Statement B: NoSQL database calls are written in the application’s programming language, a custom API call, or formatted according to a common convention (such as XML, JSON, LINQ, etc).

Options:

A.

A is true, and B is false

B.

A is false, and B is true

C.

Both A and B are false

D.

Both A and B are true

Question 17

A robots.txt file tells the search engine crawlers about the URLs which the crawler can access on your site. Which of the following is true about robots.txt?

Options:

A.

Developers must not list any sensitive files and directories in this file

B.

Developers must list all sensitive files and directories in this file to secure them

C.

Both A and B

D.

None of the above

Question 18

Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web applications by adding a URL-encoded null byte character to the user-supplied data. Which of the following is a URL-encoded representation of a null byte?

Options:

A.

%01

B.

%10

C.

%25

D.

%00

Page: 1 / 6
Total 60 questions