Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAP Exam Dumps - Certified AppSec Practitioner Exam

Go to page:
Question # 9

If the end-user input is not validated or sanitized, an application created using which of the following languages or frameworks might be prone to Insecure Deserialization vulnerability?

A.

.NET

B.

Java

C.

PHP

D.

All of the above

Full Access
Question # 10

Observe the HTTP request below and identify the vulnerability attempted.

GET /help.php?file=../../../etc/passwd HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

A.

Cross-Site Request Forgery Vulnerability

B.

Path Traversal Vulnerability

C.

Code Injection Vulnerability

D.

All of the above

Full Access
Question # 11

Your application is hosting JavaScript from a third-party website as shown in the snippet below.

Which of the following is true regarding the code snippet?

A.

The code snippet will perform validations for Cross-Site Scripting attacks

B.

The code snippet will perform validations for Cross-Site Request Forgery attacks

C.

The code snippet will perform Subresource Integrity (SRI) checks

D.

The code snippet will perform validations for Outdated Javascript checks

Full Access
Question # 12

Which SQL function can be used to read the contents of a file during manual exploitation of the SQL injection vulnerability in a MySQL database?

A.

READ_FILE()

B.

LOAD_FILE()

C.

FETCH_FILE()

D.

GET_FILE()

Full Access
Question # 13

Which of the following SSL/TLS protocols are considered to be insecure?

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2 and TLSv1.3

Full Access
Question # 14

Based on the screenshot above, which of the following is the most true?

Screenshot

![Login Form]

coder@viewer

User does not exist

[Password field]

Forget password?

[Login button]

Not yet member? Sign now

A.

The application is vulnerable to username enumeration

B.

The application is vulnerable to brute-force attacks

C.

The application does not enforce a strong password policy

D.

None of the above

Full Access
Question # 15

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. This attack is known as:

A.

Insecure Direct Object Reference

B.

Session Poisoning

C.

Session Riding OR Cross-Site Request Forgery

D.

Server-Side Request Forgery

Full Access
Question # 16

Scan the code below and identify the vulnerability which is the most applicable for this scenario.

A.

SQL Injection

B.

Type Juggling

C.

Component with a Known Vulnerability

D.

Server-Side Request Forgery

Full Access