Pre-Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CAP Certified AppSec Practitioner Exam Questions and Answers

Questions 4

In the context of NoSQL injection, which of the following is correct?

Statement A: NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance and scaling benefits. Yet these databases are still potentially vulnerable to injection attacks, even if they aren’t using the traditional SQL syntax.

Statement B: NoSQL database calls are written in the application’s programming language, a custom API call, or formatted according to a common convention (such as XML, JSON, LINQ, etc).

Options:

A.

A is true, and B is false

B.

A is false, and B is true

C.

Both A and B are false

D.

Both A and B are true

Buy Now
Questions 5

In the screenshot below, which of the following is incorrect?

Target: https://example.com

HTTP/1.1 404 Not Found

Date: Fri, 09 Dec 2022 18:03:49 GMT

Server: Apache

Vary: Cookie

X-Powered-By: PHP/5.4.5-5

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Cookie: JSESSIONID=1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789; secure; HttpOnly; SameSite=None

Options:

A.

The application discloses the framework name and version

B.

The application reveals user-agent details

C.

A cookie is set with HttpOnly and a Secure flag

D.

The application accepts insecure protocol

Buy Now
Questions 6

In the screenshot below, an attacker is attempting to exploit which vulnerability?

Request

POST /dashboard/userdata HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=7576572ce167b5634ie646de967c759643d53031

Te: trailers

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 36

useragent=https://127.0.0.1/admin

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 200 OK

Date: Fri, 09 Dec 2022 11:42:27 GMT

Content-Type: text/html; charset=UTF-8

Content-Length: 12746

Connection: keep-alive

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

X-Request-ID: 65403d71e8745d5e1fe205f44d531

Content-Length: 12746

<head>

</p><p>Admin Panel</p><p>

Options:

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

Open URL Redirection

D.

Server-Side Request Forgery

Buy Now
Questions 7

In the context of the CORS (Cross-origin resource sharing) misconfiguration, which of the following statements is true?

Options:

A.

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: true

B.

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: false

C.

CORS is exploitable if the value of the HTTP headers is Access-Control-Allow-Origin: * and the value of the Access-Control-Allow-Credentials header is irrelevant

D.

All of the above

Buy Now
Questions 8

An application’s forget password functionality is described below:

The user enters their email address and receives a message on the web page:

“If the email exists, we will email you a link to reset the password”

The user also receives an email saying:

“Please use the link below to create a new password:”

https://example.com/reset_password?userId=5298

Which of the following is true?

Options:

A.

The reset link uses an insecure channel

B.

The application is vulnerable to username enumeration

C.

The application will allow the user to reset an arbitrary user’s password

D.

Both A and C

Buy Now
Questions 9

After purchasing an item on an e-commerce website, a user can view his order details by visiting the URL:

https://example.com/order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id.

Which of the following is correct?

Options:

A.

The root cause of the problem is a lack of input validation and by implementing a strong whitelisting, the problem can be solved

B.

The root cause of the problem is a weak authorization (Session Management) and by validating a user's privileges, the issue can be fixed

C.

The problem can be solved by implementing a Web Application Firewall (WAF)

D.

None of the above

Buy Now
Questions 10

Which of the following headers helps in preventing the Clickjacking attack?

Options:

A.

Strict-Transport-Security

B.

Access-Control-Allow-Origin

C.

X-Frame-Options

D.

X-Content-Type-Options

Buy Now
Questions 11

Based on the below-mentioned code snippet, the 'filename' variable is vulnerable to which of the following attacks?

import os

filename = input("Enter the file name:")

path = "/var/www/html/files/" + filename

content = ""

with open(path, 'r') as file:

content = file.read()

print("File content:\n", content)

Options:

A.

Path Traversal

B.

Remote Code Execution

C.

Both A and B

D.

None of the above

Buy Now
Questions 12

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. This attack is known as:

Options:

A.

Insecure Direct Object Reference

B.

Session Poisoning

C.

Session Riding OR Cross-Site Request Forgery

D.

Server-Side Request Forgery

Buy Now
Questions 13

Which is the most effective way of input validation to prevent Cross-Site Scripting attacks?

Options:

A.

Blacklisting HTML and other harmful characters

B.

Whitelisting and allowing only trusted input

C.

Using a Web Application Firewall (WAF)

D.

Marking Cookie as HttpOnly

Buy Now
Questions 14

In the context of the following JWT token, which of the following statements is true?

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ey

JUYW1I1joiU2vjbB3ZiNo_mn0vNWT4G1-

ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8

Options:

A.

The highlighted segment of the token represents a JWT Header.

B.

The highlighted segment of the token represents a JWT Payload.

C.

Both A and B are correct.

D.

None of the above.

Buy Now
Questions 15

GraphQL is an open-source data query and manipulation language for APIs, and a query runtime engine. In this context, what is GraphQL Introspection?

Options:

A.

A technique for testing the compatibility of the GraphQL API with other systems

B.

A technique for testing the performance of the GraphQL API

C.

A technique for discovering the structure of the GraphQL API

D.

A technique for testing the security of the GraphQL API

Buy Now
Questions 16

If the end-user input is not validated or sanitized, an application created using which of the following languages or frameworks might be prone to Insecure Deserialization vulnerability?

Options:

A.

.NET

B.

Java

C.

PHP

D.

All of the above

Buy Now
Questions 17

The payload {{7*7}} can be used for determining which of the following vulnerabilities?

Options:

A.

Server Side Template Injection (SSTI)

B.

Client-Side Template Injection (CSTI)

C.

Both 1 and 2

D.

None of the above

Buy Now
Questions 18

The following request is vulnerable to Cross-Site Request Forgery vulnerability.

POST /changepassword HTTP/2Host: example.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0) Gecko/20100101 Firefox/107.0 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Cookie: JSESSIONID=38RC5ECV10785B53AF19816E92E2E50 Content-Length: 95

new_password=lov3MyPiano23&confirm_password=lov3MyPiano23

Options:

A.

True

B.

False

Buy Now
Exam Code: CAP
Exam Name: Certified AppSec Practitioner Exam
Last Update: Mar 7, 2025
Questions: 60

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CAP testing engine

PDF (Q&A)

$36.75  $104.99
buy now CAP pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 14 Mar 2025