Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the The SecOps Group AppSec Practitioner CAP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CAP Premium Access

View all detail and faqs for the CAP exam


526 Students Passed

86% Average Score

92% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

In the scenario described above, which of the following is correct?

Options:

A.

There is no urgency to renew the certificate as the communication is still over TLS

B.

There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack

Questions # 2:

Multifactor authentication will NOT be able to prevent:

Options:

A.

Cross-Site Scripting Vulnerability

B.

Cross-Site Request Forgery Vulnerability

C.

Path Traversal Vulnerability

D.

All of the above

Questions # 3:

The following request is vulnerable to Cross-Site Request Forgery vulnerability.

POST /changepassword HTTP/2Host: example.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0) Gecko/20100101 Firefox/107.0 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Cookie: JSESSIONID=38RC5ECV10785B53AF19816E92E2E50 Content-Length: 95

new_password=lov3MyPiano23&confirm_password=lov3MyPiano23

Options:

A.

True

B.

False

Questions # 4:

While performing a security audit of a web application, you discovered an exposed docker-compose.yml file. What is the significance of this file and what data can be found in it?

Options:

A.

The docker-compose.yml file is a YAML file that contains the application source code.

B.

The docker-compose.yml file is a YAML file that contains the server logs and user session information including but not limited to admin users.

C.

The docker-compose.yml file is a YAML file that is used to define the services, networks, and volumes required for a Docker application. It specifies the configuration and dependencies for all containers in the application, including their network settings and container volumes.

D.

The docker-compose.yml file is a YAML file that contains the configuration of load balancers and firewalls.

Questions # 5:

Which of the following is NOT an asymmetric key encryption algorithm?

Options:

A.

AES

B.

RSA

C.

Diffie-Hellman

D.

DSA

Questions # 6:

Which of the following is considered as a safe password?

Options:

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

Questions # 7:

Based on the below request/response, which of the following statements is true?

Send

GET /dashboard.php?purl=http://attacker.com HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 302 Found 2022-12-03 17:38:18 GMT

Date: Sat, 03 Dec 2022 17:38:18 GMT

Server: Apache/2.4.54 (Unix) OpenSSL/1.0.2k-fips PHP/8.0.25

X-Powered-By: PHP/8.0.25

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Connection: keep-alive

Location: http://attacker.com

Set-Cookie: JSESSIONID=38C5ECV10785B53AF29816E92E2E50; Path=/; HttpOnly

Options:

A.

Application is likely to be vulnerable to Open Redirection vulnerability

B.

Application is vulnerable to Cross-Site Request Forgery vulnerability

C.

Application uses an insecure protocol

D.

All of the above

Questions # 8:

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. There are two fixes:

(Bob’s Fix): In order to fix this vulnerability, a developer called Bob devised a fix so that the URL does not disclose the numeric value of the order_id but uses a SHA1 hash of the order_id in the URL, such as:

https://example.com/?order_id=1ff0fe6f1599536d1326418124a261bc98b8ea1

Note: that the SHA1 value of 53870 is 1ff0fe6f1599536d1326418124a261bc98b8ea1

(John’s Fix): Another developer called John devised a different fix so that the URL does not disclose the numeric value of the order_id and uses a Base64 encoded value of the order_id in the URL, such as:

https://example.com/?order_id=NTM4NzA=

Note: that the Base64 encoded value of 53870 is NTM4NzA=

Which of the following is correct?

Options:

A.

Both solutions are adequate to fix the problem

B.

Both solutions are inadequate and the vulnerability is still not fixed

C.

Only John’s solution fixes the problem

D.

Only Bob’s solution fixes the problem

Questions # 9:

Which of the following is NOT a symmetric key encryption algorithm?

Options:

A.

RC4

B.

AES

C.

DES

D.

RSA

Questions # 10:

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /dashboard HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=7576572ce164646de967c759643d53031

Te: trailers

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 81

xml_foo=]>&example;

<!DOCTYPE foo []>&example;

&example;

<title>Project Meeting</title>

changed example

</body>

Options:

A.

Path Traversal Attack

B.

Server Side Template Injection

C.

XML Bomb Attack

D.

XML External Entity Attack

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.