Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CAP Certified AppSec Practitioner Exam Questions and Answers

Questions 4

Which of the following is NOT a symmetric key encryption algorithm?

Options:

A.

RC4

B.

AES

C.

DES

D.

RSA

Buy Now
Questions 5

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

(Note that the developer has included a one-time random token with the ‘userId’ parameter in the link). So, the link seems like:

https://example.com/reset_password?userId=5298 &token=70e7803e-bf53-45e1-8a3f-fb15da7de3a0

Will this mechanism prevent an attacker from resetting arbitrary users’ passwords?

Options:

A.

True

B.

False

Buy Now
Questions 6

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

http://example.com/reset_password?userId=5298

Which of the following is true?

Options:

A.

The reset link uses an insecure channel

B.

The application is vulnerable to username enumeration

C.

The application will allow the user to reset an arbitrary user’s password

D.

Both A and C

Buy Now
Questions 7

The following request is vulnerable to Cross-Site Request Forgery vulnerability.

POST /changepassword HTTP/2Host: example.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0) Gecko/20100101 Firefox/107.0 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Cookie: JSESSIONID=38RC5ECV10785B53AF19816E92E2E50 Content-Length: 95

new_password=lov3MyPiano23&confirm_password=lov3MyPiano23

Options:

A.

True

B.

False

Buy Now
Questions 8

Which of the following hashing algorithms is considered to be the most secure amongst these?

Options:

A.

SHA-0

B.

MD5

C.

SHA-1

D.

Bcrypt

Buy Now
Questions 9

What is the name of the WordPress file that contains the database connection information, including the database name, username, and password?

Options:

A.

wp-configuration.php

B.

wp-conf.php

C.

wp-secret.php

D.

wp-config.php

Buy Now
Questions 10

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. This attack is known as:

Options:

A.

Insecure Direct Object Reference

B.

Session Poisoning

C.

Session Riding OR Cross-Site Request Forgery

D.

Server-Side Request Forgery

Buy Now
Questions 11

Salt is a cryptographically secure random string that is added to a password before it is hashed. In this context, what is the primary objective of salting?

Options:

A.

To defend against dictionary attacks or attacks against hashed passwords using a rainbow table.

B.

To slow down the hash calculation process.

C.

To generate a long password hash that is difficult to crack.

D.

To add a secret message to the password hash.

Buy Now
Questions 12

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

Options:

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Buy Now
Questions 13

In the context of the Race Condition vulnerability, which of the following statements is true?

Options:

A.

A situation that occurs when two threads access the same resource at the same time.

B.

A situation that occurs when two threads access different resources at the same time.

C.

A situation that occurs when a single thread unpredictably accesses two resources.

D.

A situation that occurs when a single thread predictably accesses two resources.

Buy Now
Questions 14

Which of the following attributes is NOT used to secure the cookie?

Options:

A.

HttpOnly

B.

Secure

C.

Restrict

D.

Same-Site

Buy Now
Questions 15

Which of the following security attributes ensures that the browser only sends the cookie over a TLS (encrypted) channel?

Options:

A.

Secure

B.

HttpOnly

C.

No_XSS

D.

None of the above

Buy Now
Questions 16

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /upload.php HTTP/1.1

Host: example.com

Cookie: session=xyz123;JSESSIONID=abc123

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW

Content-Length: 12345

Connection: keep-alive

Content-Disposition: form-data; name="avatar"; filename="malicious.php"

Content-Type: image/jpeg

phpinfo();

?>

Options:

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

File Upload Vulnerability

D.

Server-Side Request Forgery

Buy Now
Questions 17

Based on the screenshot above, which of the following is the most true?

Screenshot

![Login Form]

coder@viewer

User does not exist

[Password field]

Forget password?

[Login button]

Not yet member? Sign now

Options:

A.

The application is vulnerable to username enumeration

B.

The application is vulnerable to brute-force attacks

C.

The application does not enforce a strong password policy

D.

None of the above

Buy Now
Questions 18

Based on the below HTTP request, which of the following statements is correct?

POST /changepassword HTTP/2

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: same-origin

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Content-Length: 95

new_password=usher!@22&confirm_password=usher!@22

Options:

A.

The change password feature does not validate the user

B.

The change password feature uses basic authorization

C.

The change password feature is vulnerable to Cross-Site Request Forgery attack

D.

All of the above

Buy Now
Exam Code: CAP
Exam Name: Certified AppSec Practitioner Exam
Last Update: Apr 2, 2025
Questions: 60
CAP pdf

CAP PDF

$25.5  $84.99
CAP Engine

CAP Testing Engine

$30  $99.99
CAP PDF + Engine

CAP PDF + Testing Engine

$40.5  $134.99