Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified AppSec Practitioner Exam Question and Answers

Certified AppSec Practitioner Exam

Last Update Oct 7, 2025
Total Questions : 60

We are offering FREE CAP The SecOps Group exam questions. All you do is to just go and sign up. Give your details, prepare CAP free exam questions and then go for complete pool of Certified AppSec Practitioner Exam test questions that will help you more.

CAP pdf

CAP PDF

$42  $104.99
CAP Engine

CAP Testing Engine

$50  $124.99
CAP PDF + Engine

CAP PDF + Testing Engine

$66  $164.99
Questions 1

In the screenshot below, an attacker is attempting to exploit which vulnerability?

POST /upload.php HTTP/1.1

Host: example.com

Cookie: session=xyz123;JSESSIONID=abc123

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW

Content-Length: 12345

Connection: keep-alive

Content-Disposition: form-data; name="avatar"; filename="malicious.php"

Content-Type: image/jpeg

phpinfo();

?>

Options:

A.  

HTTP Desync Attack

B.  

File Path Traversal Attack

C.  

File Upload Vulnerability

D.  

Server-Side Request Forgery

Discussion 0
Questions 2

In the context of a Dependency Confusion Attack, which of the following files is analyzed for determining potential private packages?

Options:

A.  

package.json

B.  

requirements.txt

C.  

Both A and B

D.  

None of the above

Discussion 0
Questions 3

After purchasing an item on an e-commerce website, a user can view his order details by visiting the URL:

https://example.com/order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id.

Which of the following is correct?

Options:

A.  

The root cause of the problem is a lack of input validation and by implementing a strong whitelisting, the problem can be solved

B.  

The root cause of the problem is a weak authorization (Session Management) and by validating a user's privileges, the issue can be fixed

C.  

The problem can be solved by implementing a Web Application Firewall (WAF)

D.  

None of the above

Discussion 0
Questions 4

In the context of the CORS (Cross-origin resource sharing) misconfiguration, which of the following statements is true?

Options:

A.  

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: true

B.  

CORS is exploitable if the value of the HTTP headers are Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: false

C.  

CORS is exploitable if the value of the HTTP headers is Access-Control-Allow-Origin: * and the value of the Access-Control-Allow-Credentials header is irrelevant

D.  

All of the above

Discussion 0
Questions 5

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

Which of the following is correct?

Options:

A.  

There is no urgency to renew the certificate as the communication is still over TLS

B.  

There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack

Discussion 0
Questions 6

Based on the screenshot below, which of the following statements is true?

Request

GET /userProfile.php?sessionId=7576572ce164646de967c759643d53031 HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=7576572ce164646de967c759643d53031

Te: trailers

Connection: keep-alive

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 200 OK

Date: Fri, 09 Dec 2022 11:42:27 GMT

Server: Apache/2.4.54 (Unix) OpenSSL/1.0.2k-fips PHP/8.0.25

X-Powered-By: PHP/8.0.25

Content-Length: 12746

Content-Type: text/html; charset=UTF-8

Connection: keep-alive

Set-Cookie: JSESSIONID=7576572ce164646de967c759643d53031; Path=/; HttpOnly

Example Domain

...

Options:

A.  

The application uses an insecure channel (non-TLS)

B.  

The application uses an insecure HTTP method (GET) to send sensitive information

C.  

The application is vulnerable to Cross-Site Scripting attacks

D.  

All of the above

Discussion 0
Questions 7

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. There are two fixes:

(Bob’s Fix): In order to fix this vulnerability, a developer called Bob devised a fix so that the URL does not disclose the numeric value of the order_id but uses a SHA1 hash of the order_id in the URL, such as:

https://example.com/?order_id=1ff0fe6f1599536d1326418124a261bc98b8ea1

Note: that the SHA1 value of 53870 is 1ff0fe6f1599536d1326418124a261bc98b8ea1

(John’s Fix): Another developer called John devised a different fix so that the URL does not disclose the numeric value of the order_id and uses a Base64 encoded value of the order_id in the URL, such as:

https://example.com/?order_id=NTM4NzA=

Note: that the Base64 encoded value of 53870 is NTM4NzA=

Which of the following is correct?

Options:

A.  

Both solutions are adequate to fix the problem

B.  

Both solutions are inadequate and the vulnerability is still not fixed

C.  

Only John’s solution fixes the problem

D.  

Only Bob’s solution fixes the problem

Discussion 0
Questions 8

Scan the code below and identify the vulnerability which is the most applicable for this scenario.

Options:

A.  

SQL Injection

B.  

Type Juggling

C.  

Component with a Known Vulnerability

D.  

Server-Side Request Forgery

Discussion 0
Questions 9

In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?

Options:

A.  

JNDI Injection

B.  

JNDI Injection

C.  

JNDI Injection

D.  

None of the above

Discussion 0
Questions 10

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. This attack is known as:

Options:

A.  

Insecure Direct Object Reference

B.  

Session Poisoning

C.  

Session Riding OR Cross-Site Request Forgery

D.  

Server-Side Request Forgery

Discussion 0
Questions 11

You found the xmrpc.php endpoint while performing a security assessment on a web application. The target application is most likely using which of the following Content Management Systems (CMS)?

Options:

A.  

WordPress

B.  

Drupal

C.  

Both A and B

D.  

None of the above

Discussion 0
Questions 12

In the screenshot below, which of the following is incorrect?

Target: https://example.com

HTTP/1.1 404 Not Found

Date: Fri, 09 Dec 2022 18:03:49 GMT

Server: Apache

Vary: Cookie

X-Powered-By: PHP/5.4.5-5

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Cookie: JSESSIONID=1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789; secure; HttpOnly; SameSite=None

Options:

A.  

The application discloses the framework name and version

B.  

The application reveals user-agent details

C.  

A cookie is set with HttpOnly and a Secure flag

D.  

The application accepts insecure protocol

Discussion 0
Questions 13

While performing a security audit of a web application, you discovered an exposed docker-compose.yml file. What is the significance of this file and what data can be found in it?

Options:

A.  

The docker-compose.yml file is a YAML file that contains the application source code.

B.  

The docker-compose.yml file is a YAML file that contains the server logs and user session information including but not limited to admin users.

C.  

The docker-compose.yml file is a YAML file that is used to define the services, networks, and volumes required for a Docker application. It specifies the configuration and dependencies for all containers in the application, including their network settings and container volumes.

D.  

The docker-compose.yml file is a YAML file that contains the configuration of load balancers and firewalls.

Discussion 0
Questions 14

A robots.txt file tells the search engine crawlers about the URLs which the crawler can access on your site. Which of the following is true about robots.txt?

Options:

A.  

Developers must not list any sensitive files and directories in this file

B.  

Developers must list all sensitive files and directories in this file to secure them

C.  

Both A and B

D.  

None of the above

Discussion 0
Questions 15

Based on the screenshot above, which of the following is the most true?

Screenshot

![Login Form]

coder@viewer

User does not exist

[Password field]

Forget password?

[Login button]

Not yet member? Sign now

Options:

A.  

The application is vulnerable to username enumeration

B.  

The application is vulnerable to brute-force attacks

C.  

The application does not enforce a strong password policy

D.  

None of the above

Discussion 0
Questions 16

Your application is hosting JavaScript from a third-party website as shown in the snippet below.

Which of the following is true regarding the code snippet?

Options:

A.  

The code snippet will perform validations for Cross-Site Scripting attacks

B.  

The code snippet will perform validations for Cross-Site Request Forgery attacks

C.  

The code snippet will perform Subresource Integrity (SRI) checks

D.  

The code snippet will perform validations for Outdated Javascript checks

Discussion 0
Questions 17

Which is the most effective way of input validation to prevent Cross-Site Scripting attacks?

Options:

A.  

Blacklisting HTML and other harmful characters

B.  

Whitelisting and allowing only trusted input

C.  

Using a Web Application Firewall (WAF)

D.  

Marking Cookie as HttpOnly

Discussion 0
Questions 18

Which of the following is considered as a safe password?

Options:

A.  

Monday@123

B.  

abcdef

C.  

Sq0Jh819%ak

D.  

1234567890

Discussion 0