Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

The SecOps Group CAP Certified AppSec Practitioner Exam Exam Practice Test

Demo: 18 questions
Total 60 questions

Certified AppSec Practitioner Exam Questions and Answers

Question 1

Which of the following SSL/TLS protocols are considered to be insecure?

Options:

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2 and TLSv1.3

Question 2

Multifactor authentication will NOT be able to prevent:

Options:

A.

Cross-Site Scripting Vulnerability

B.

Cross-Site Request Forgery Vulnerability

C.

Path Traversal Vulnerability

D.

All of the above

Question 3

After purchasing an item on an e-commerce website, a user can view his order details by visiting the URL:

https://example.com/order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id.

Which of the following is correct?

Options:

A.

The root cause of the problem is a lack of input validation and by implementing a strong whitelisting, the problem can be solved

B.

The root cause of the problem is a weak authorization (Session Management) and by validating a user's privileges, the issue can be fixed

C.

The problem can be solved by implementing a Web Application Firewall (WAF)

D.

None of the above

Question 4

Which of the following HTTP response header prevents the client from caching the HTTP response in the most secure manner?

Options:

A.

Cache-Control: no-cache, no-store

B.

Secure-Cache: Enabled

C.

Cache-Control: Private

D.

Content-Security-Policy: no-cache, no-store

Question 5

Which of the following headers helps in preventing the Clickjacking attack?

Options:

A.

Strict-Transport-Security

B.

Access-Control-Allow-Origin

C.

X-Frame-Options

D.

X-Content-Type-Options

Question 6

You found the xmrpc.php endpoint while performing a security assessment on a web application. The target application is most likely using which of the following Content Management Systems (CMS)?

Options:

A.

WordPress

B.

Drupal

C.

Both A and B

D.

None of the above

Question 7

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

Options:

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Question 8

The DNS entries forwww.ironman.com andwww.hulk.com both point to the same IP address i.e., 1.3.3.7. How does the web server know which web application is being requested by the end user's browser?

Options:

A.

The web server inspects the HTTP "Host" header sent by the client.

B.

The web server inspects the cookies sent by the client.

C.

The web server inspects the client's SSL certificate.

D.

The web server uses a reverse DNS lookup of the client's IP address.

Question 9

Which of the following is considered as a safe password?

Options:

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

Question 10

Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web applications by adding a URL-encoded null byte character to the user-supplied data. Which of the following is a URL-encoded representation of a null byte?

Options:

A.

%01

B.

%10

C.

%25

D.

%00

Question 11

In the context of the following JWT token, which of the following statement is true?

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ey

JUYW1I1joiU2vjbB3ZiNo_mn0vNWT4G1-

ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8

Options:

A.

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9 represents a JWT Signature.

B.

mn0vNWT4G1-ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8 represents a JWT Signature.

C.

eyJUYW1I1joiU2vjbB3ZiNo represents a JWT Signature.

D.

None of the above.

Question 12

Salt is a cryptographically secure random string that is added to a password before it is hashed. In this context, what is the primary objective of salting?

Options:

A.

To defend against dictionary attacks or attacks against hashed passwords using a rainbow table.

B.

To slow down the hash calculation process.

C.

To generate a long password hash that is difficult to crack.

D.

To add a secret message to the password hash.

Question 13

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

http://example.com/reset_password?userId=5298

Which of the following is true?

Options:

A.

The reset link uses an insecure channel

B.

The application is vulnerable to username enumeration

C.

The application will allow the user to reset an arbitrary user’s password

D.

Both A and C

Question 14

In the context of the CORS (Cross-origin resource sharing) misconfiguration, which of the following statements is true?

Options:

A.

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: true

B.

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: false

C.

CORS is exploitable if the value of the HTTP headers is Access-Control-Allow-Origin: * and the value of the Access-Control-Allow-Credentials header is irrelevant

D.

All of the above

Question 15

Which of the following is NOT an asymmetric key encryption algorithm?

Options:

A.

AES

B.

RSA

C.

Diffie-Hellman

D.

DSA

Question 16

Which of the following directives in a Content-Security-Policy HTTP response header, can be used to prevent a Clickjacking attack?

Options:

A.

script-src

B.

object-src

C.

frame-ancestors

D.

base-uri