Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CAP Certified AppSec Practitioner Exam Questions and Answers

Questions 4

Which of the following hashing algorithms is considered to be the most secure amongst these?

Options:

A.

SHA-0

B.

MD5

C.

SHA-1

D.

Bcrypt

Buy Now
Questions 5

Determine the primary defense against a SQL injection vulnerability

Options:

A.

Using a Web Application Firewall (WAF)

B.

Prepared Statements with Parameterized Queries

C.

Use of NoSQL Database

D.

Blacklisting Single Quote Character (‘)

Buy Now
Questions 6

In the screenshot below, an attacker is attempting to exploit which vulnerability?

Request

POST /dashboard/userdata HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=7576572ce167b5634ie646de967c759643d53031

Te: trailers

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 36

useragent=http://127.0.0.1/admin

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 200 OK

Date: Fri, 09 Dec 2022 11:42:27 GMT

Content-Type: text/html; charset=UTF-8

Content-Length: 12746

Connection: keep-alive

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

X-Request-ID: 65403d71e8745d5e1fe205f44d531

Content-Length: 12746

<html>

<head>

<meta charset="utf-8">

<meta name="viewport" content="width=device-width, initial-scale=1">

<title>

Admin Panel

</title>

Options:

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

Open URL Redirection

D.

Server-Side Request Forgery

Buy Now
Questions 7

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

Options:

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Buy Now
Questions 8

What is the full form of SAML?

Options:

A.

Security Assertion Markup Language

B.

Security Authorization Markup Language

C.

Security Assertion Management Language

D.

Secure Authentication Markup Language

Buy Now
Questions 9

Based on the below HTTP request, which of the following statements is correct?

POST /changepassword HTTP/2

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: same-origin

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Content-Length: 95

new_password=usher!@22&confirm_password=usher!@22

Options:

A.

The change password feature does not validate the user

B.

The change password feature uses basic authorization

C.

The change password feature is vulnerable to Cross-Site Request Forgery attack

D.

All of the above

Buy Now
Questions 10

Based on the below-mentioned code snippet, the 'filename' variable is vulnerable to which of the following attacks?

import os

filename = input("Enter the file name:")

path = "/var/www/html/files/" + filename

content = ""

with open(path, 'r') as file:

content = file.read()

print("File content:\n", content)

Options:

A.

Path Traversal

B.

Remote Code Execution

C.

Both A and B

D.

None of the above

Buy Now
Questions 11

Observe the HTTP request below and identify the vulnerability attempted.

GET /help.php?file=../../../etc/passwd HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

Options:

A.

Cross-Site Request Forgery Vulnerability

B.

Path Traversal Vulnerability

C.

Code Injection Vulnerability

D.

All of the above

Buy Now
Questions 12

While performing a security audit of a web application, you discovered an exposed docker-compose.yml file. What is the significance of this file and what data can be found in it?

Options:

A.

The docker-compose.yml file is a YAML file that contains the application source code.

B.

The docker-compose.yml file is a YAML file that contains the server logs and user session information including but not limited to admin users.

C.

The docker-compose.yml file is a YAML file that is used to define the services, networks, and volumes required for a Docker application. It specifies the configuration and dependencies for all containers in the application, including their network settings and container volumes.

D.

The docker-compose.yml file is a YAML file that contains the configuration of load balancers and firewalls.

Buy Now
Questions 13

Under the same-origin policy (also SOP), a web browser permits scripts contained in a web page to access data in another web page, but only if both web pages have the same origin. Which of the following pages are in the same origin as that of the below URL?

http://www.example.com/dir/page2.html

    http://www.example.com/dir/other.html

    http://www.example.com:81/dir/other.html

    http://www.example.com/dir/other.html

    http://en.example.com/dir/other.html

Options:

A.

1 Only

B.

1 and 2

C.

1, 3 and 4

D.

None of the above

Buy Now
Questions 14

A robots.txt file tells the search engine crawlers about the URLs which the crawler can access on your site. Which of the following is true about robots.txt?

Options:

A.

Developers must not list any sensitive files and directories in this file

B.

Developers must list all sensitive files and directories in this file to secure them

C.

Both A and B

D.

None of the above

Buy Now
Questions 15

Which of the following attributes is NOT used to secure the cookie?

Options:

A.

HttpOnly

B.

Secure

C.

Restrict

D.

Same-Site

Buy Now
Questions 16

In the context of the CORS (Cross-origin resource sharing) misconfiguration, which of the following statements is true?

Options:

A.

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: true

B.

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: false

C.

CORS is exploitable if the value of the HTTP headers is Access-Control-Allow-Origin: * and the value of the Access-Control-Allow-Credentials header is irrelevant

D.

All of the above

Buy Now
Questions 17

In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?

Options:

A.

JNDI Injection

B.

JNDI Injection

C.

JNDI Injection

D.

None of the above

Buy Now
Questions 18

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /upload.php HTTP/1.1

Host: example.com

Cookie: session=xyz123;JSESSIONID=abc123

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW

Content-Length: 12345

Connection: keep-alive

Content-Disposition: form-data; name="avatar"; filename="malicious.php"

Content-Type: image/jpeg

<?php

phpinfo();

?>

Options:

A.

HTTP Desync Attack

B.

File Path Traversal Attack

C.

File Upload Vulnerability

D.

Server-Side Request Forgery

Buy Now
Exam Code: CAP
Exam Name: Certified AppSec Practitioner Exam
Last Update: Sep 11, 2025
Questions: 60

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99