Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Certified AppSec Practitioner Exam

Last Update 19 hours ago Total Questions : 60

The Certified AppSec Practitioner Exam content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include CAP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CAP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CAP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified AppSec Practitioner Exam practice test comfortably within the allotted time.

Question # 4

Observe the HTTP request below and identify the vulnerability attempted.

GET /help.php?file=../../../etc/passwd HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

A.

Cross-Site Request Forgery Vulnerability

B.

Path Traversal Vulnerability

C.

Code Injection Vulnerability

D.

All of the above

Question # 5

In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?

A.

JNDI Injection

B.

JNDI Injection

C.

JNDI Injection

D.

None of the above

Question # 6

You found the xmrpc.php endpoint while performing a security assessment on a web application. The target application is most likely using which of the following Content Management Systems (CMS)?

A.

WordPress

B.

Drupal

C.

Both A and B

D.

None of the above

Question # 7

Which of the following is considered as a safe password?

A.

Monday@123

B.

abcdef

C.

Sq0Jh819%ak

D.

1234567890

Question # 8

The application is vulnerable to Cross-Site Scripting. Which of the following exploitation is NOT possible at all?

A.

Steal the user's session identifier stored on a non HttpOnly cookie

B.

Steal the contents from the web page

C.

Steal the contents from the application's database

D.

Steal the contents from the user's keystrokes using keyloggers

Question # 9

A robots.txt file tells the search engine crawlers about the URLs which the crawler can access on your site. Which of the following is true about robots.txt?

A.

Developers must not list any sensitive files and directories in this file

B.

Developers must list all sensitive files and directories in this file to secure them

C.

Both A and B

D.

None of the above

Question # 10

Determine the primary defense against a SQL injection vulnerability

A.

Using a Web Application Firewall (WAF)

B.

Prepared Statements with Parameterized Queries

C.

Use of NoSQL Database

D.

Blacklisting Single Quote Character (‘)

Go to page: