New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! CAP has been withdrawn.

Practice Free CAP Certified AppSec Practitioner Exam Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the The SecOps Group CAP Exam the most current and reliable questions . To help people study, we've made some of our Certified AppSec Practitioner Exam exam materials available for free to everyone. You can take the Free CAP Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Which of the following is NOT a symmetric key encryption algorithm?

A.

RC4

B.

AES

C.

DES

D.

RSA

Question # 7

Determine the primary defense against a SQL injection vulnerability

A.

Using a Web Application Firewall (WAF)

B.

Prepared Statements with Parameterized Queries

C.

Use of NoSQL Database

D.

Blacklisting Single Quote Character (‘)

Question # 8

Based on the screenshot below, which of the following statements is true?

HTTP/1.1 200 OK

Accept-Ranges: bytes

Age: 359987

Cache-Control: max-age=604800

Content-Type: text/html; charset=UTF-8

Date: Fri, 02 Dec 2022 18:33:05 GMT

Expires: Fri, 09 Dec 2022 18:33:05 GMT

Last-Modified: Mon, 28 Nov 2022 14:33:18 GMT

Server: Microsoft-IIS/8.0

X-AspNet-Version: 2.0.50727

Vary: Accept-Encoding

X-Powered-By: ASP.NET

Content-Length: 1256

A.

The application is using an outdated server technology

B.

The application is disclosing the server version

C.

The application is disclosing the version of the framework used

D.

All of the above

Question # 9

Which of the following is NOT an asymmetric key encryption algorithm?

A.

AES

B.

RSA

C.

Diffie-Hellman

D.

DSA

Question # 10

Which of the following Google Dorks can be used for finding directory listing on victim-app.com?

A.

intitle:"Index of" site:victim-app.com

B.

intext:"Index of" site:victim-app.com

C.

Both A and B

D.

None of the above

Question # 11

In the context of the following JWT token, which of the following statement is true?

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ey

JUYW1I1joiU2vjbB3ZiNo_mn0vNWT4G1-

ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8

A.

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9 represents a JWT Signature.

B.

mn0vNWT4G1-ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8 represents a JWT Signature.

C.

eyJUYW1I1joiU2vjbB3ZiNo represents a JWT Signature.

D.

None of the above.

Question # 12

In the context of the following JWT token, which of the following statements is true?

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.ey

JUYW1I1joiU2vjbB3ZiNo_mn0vNWT4G1-

ATqOTmo7rm70VI12WCdkMI_S1_bPg_G8

A.

The highlighted segment of the token represents a JWT Header.

B.

The highlighted segment of the token represents a JWT Payload.

C.

Both A and B are correct.

D.

None of the above.

Question # 13

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /upload.php HTTP/1.1

Host: example.com

Cookie: session=xyz123;JSESSIONID=abc123

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW

Content-Length: 12345

Connection: keep-alive

Content-Disposition: form-data; name="avatar"; filename="malicious.php"

Content-Type: image/jpeg

phpinfo();

?>

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

File Upload Vulnerability

D.

Server-Side Request Forgery

Question # 14

What is the full form of SAML?

A.

Security Assertion Markup Language

B.

Security Authorization Markup Language

C.

Security Assertion Management Language

D.

Secure Authentication Markup Language

Question # 15

Which of the following is correct?

A.

The browser contains the private key of all known Certifying Authorities (CA) and based on that, it differentiates between a valid and an invalid TLS Certificate

B.

The browser contains the public key of all known Certifying Authorities (CA) and based on that it is able to differentiate between a valid and an invalid TLS Certificate

C.

The browser contains both the public and private key of all known Certifying Authorities (CA) and based on that it is able to differentiate between a valid and an invalid TLS Certificate

D.

The browser does not have any mechanism to validate the TLS Certificate

Question # 16

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Question # 17

Which is the most effective way of input validation to prevent Cross-Site Scripting attacks?

A.

Blacklisting HTML and other harmful characters

B.

Whitelisting and allowing only trusted input

C.

Using a Web Application Firewall (WAF)

D.

Marking Cookie as HttpOnly

Question # 18

While performing a security audit of a web application, you discovered an exposed docker-compose.yml file. What is the significance of this file and what data can be found in it?

A.

The docker-compose.yml file is a YAML file that contains the application source code.

B.

The docker-compose.yml file is a YAML file that contains the server logs and user session information including but not limited to admin users.

C.

The docker-compose.yml file is a YAML file that is used to define the services, networks, and volumes required for a Docker application. It specifies the configuration and dependencies for all containers in the application, including their network settings and container volumes.

D.

The docker-compose.yml file is a YAML file that contains the configuration of load balancers and firewalls.