Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

The SecOps Group CAP - Certified AppSec Practitioner Exam

Page: 1 / 2
Total 60 questions

Which of the following hashing algorithms is considered to be the most secure amongst these?

A.

SHA-0

B.

MD5

C.

SHA-1

D.

Bcrypt

In the context of a Dependency Confusion Attack, which of the following files is analyzed for determining potential private packages?

A.

package.json

B.

requirements.txt

C.

Both A and B

D.

None of the above

Which of the following SSL/TLS protocols are considered to be insecure?

A.

SSLv2 and SSLv3

B.

TLSv1.0 and TLSv1.1

C.

Both A and B

D.

SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2 and TLSv1.3

Multifactor authentication will NOT be able to prevent:

A.

Cross-Site Scripting Vulnerability

B.

Cross-Site Request Forgery Vulnerability

C.

Path Traversal Vulnerability

D.

All of the above

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. This attack is known as:

A.

Insecure Direct Object Reference

B.

Session Poisoning

C.

Session Riding OR Cross-Site Request Forgery

D.

Server-Side Request Forgery

Which of the following is NOT an asymmetric key encryption algorithm?

A.

AES

B.

RSA

C.

Diffie-Hellman

D.

DSA

Which of the following is NOT a symmetric key encryption algorithm?

A.

RC4

B.

AES

C.

DES

D.

RSA

In the context of the Race Condition vulnerability, which of the following statements is true?

A.

A situation that occurs when two threads access the same resource at the same time.

B.

A situation that occurs when two threads access different resources at the same time.

C.

A situation that occurs when a single thread unpredictably accesses two resources.

D.

A situation that occurs when a single thread predictably accesses two resources.

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

In the scenario described above, which of the following is correct?

A.

There is no urgency to renew the certificate as the communication is still over TLS

B.

There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack

Which is the most effective way of input validation to prevent Cross-Site Scripting attacks?

A.

Blacklisting HTML and other harmful characters

B.

Whitelisting and allowing only trusted input

C.

Using a Web Application Firewall (WAF)

D.

Marking Cookie as HttpOnly