Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CAP Exam Dumps - The SecOps Group AppSec Practitioner Questions and Answers

Question # 14

Null Byte Injection is an active exploitation technique used to bypass sanity-checking filters in web applications by adding a URL-encoded null byte character to the user-supplied data. Which of the following is a URL-encoded representation of a null byte?

Options:

A.

%01

B.

%10

C.

%25

D.

%00

Buy Now
Question # 15

Based on the screenshot above, which of the following is the most true?

Screenshot

![Login Form]

coder@viewer

User does not exist

[Password field]

Forget password?

[Login button]

Not yet member? Sign now

Options:

A.

The application is vulnerable to username enumeration

B.

The application is vulnerable to brute-force attacks

C.

The application does not enforce a strong password policy

D.

None of the above

Buy Now
Question # 16

Which of the following security attributes ensures that the browser only sends the cookie over a TLS (encrypted) channel?

Options:

A.

Secure

B.

HttpOnly

C.

No_XSS

D.

None of the above

Buy Now
Question # 17

Which HTTP header is used by the CORS (Cross-origin resource sharing) standard to control access to resources on a server?

Options:

A.

Access-Control-Request-Method

B.

Access-Control-Request-Headers

C.

Access-Control-Allow-Headers

D.

None of the above

Buy Now
Question # 18

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /dashboard HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=7576572ce164646de967c759643d53031

Te: trailers

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 81

xml_foo=]>&example;

]>&example;

&example;

Project Meeting

changed example

Options:

A.

Path Traversal Attack

B.

Server Side Template Injection

C.

XML Bomb Attack

D.

XML External Entity Attack

Buy Now
Question # 19

Which of the following Google Dorks can be used for finding directory listing on victim-app.com?

Options:

A.

intitle:"Index of" site:victim-app.com

B.

intext:"Index of" site:victim-app.com

C.

Both A and B

D.

None of the above

Buy Now
Question # 20

Observe the HTTP request below and identify the vulnerability attempted.

GET /help.php?file=../../../etc/passwd HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:107.0) Gecko/20100101 Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

Options:

A.

Cross-Site Request Forgery Vulnerability

B.

Path Traversal Vulnerability

C.

Code Injection Vulnerability

D.

All of the above

Buy Now
Question # 21

If the end-user input is not validated or sanitized, an application created using which of the following languages or frameworks might be prone to Insecure Deserialization vulnerability?

Options:

A.

.NET

B.

Java

C.

PHP

D.

All of the above

Buy Now
Exam Code: CAP
Exam Name: Certified AppSec Practitioner Exam
Last Update: Apr 3, 2025
Questions: 60
CAP pdf

CAP PDF

$25.5  $84.99
CAP Engine

CAP Testing Engine

$28.5  $94.99
CAP PDF + Engine

CAP PDF + Testing Engine

$40.5  $134.99