Pass the The SecOps Group AppSec Practitioner CAP Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your application is hosting JavaScript from a third-party website as shown in the snippet below.

<script src="https://[//cdn.thirdparty-example.com/](example.js)" integrity="sha384-Fmb0CYeA6gM2uLuyvqs7x75u0mktDh2nKLomp3PHkJ0b5vJF2qF6Gbrc/6dK" crossorigin="anonymous" ></script>

Which of the following is true regarding the code snippet?

Options:

A.

The code snippet will perform validations for Cross-Site Scripting attacks


B.

The code snippet will perform validations for Cross-Site Request Forgery attacks


C.

The code snippet will perform Subresource Integrity (SRI) checks


D.

The code snippet will perform validations for Outdated Javascript checks


Expert Solution
Questions # 12:

Scan the code below and identify the vulnerability which is the most applicable for this scenario.

<meta charset="utf-8">

<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">

<meta name="description" content="xss">

<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.1/css/bootstrap.min.css" integrity="sha384-WskhaSGFgHYWDcbwN70/dfYBj47jz9qbsMId/iRN3ewGhXQFZCSftd1LZCfmhktB" crossorigin="anonymous" >

<link rel="shortcut icon" href="/favicon.ico">

<link charset="utf-8" media="all" type="text/css" href="/static/css/main.css" rel="stylesheet">

<script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js" ></script>

Options:

A.

SQL Injection


B.

Type Juggling


C.

Component with a Known Vulnerability


D.

Server-Side Request Forgery


Expert Solution
Questions # 13:

The payload {{7*7}} can be used for determining which of the following vulnerabilities?

Options:

A.

Server Side Template Injection (SSTI)


B.

Client-Side Template Injection (CSTI)


C.

Both 1 and 2


D.

None of the above


Expert Solution
Questions # 14:

Which of the following security attributes ensures that the browser only sends the cookie over a TLS (encrypted) channel?

Options:

A.

Secure


B.

HttpOnly


C.

No_XSS


D.

None of the above


Expert Solution
Questions # 15:

Based on the below request/response, which of the following statements is true?

Send

GET /dashboard.php?purl=http://attacker.com HTTP/1.1

Host: example.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) Firefox/107.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-GB,en;q=0.5

Accept-Encoding: gzip, deflate

Upgrade-Insecure-Requests: 1

Sec-Fetch-Dest: document

Sec-Fetch-Mode: navigate

Sec-Fetch-Site: none

Sec-Fetch-User: ?1

Cookie: JSESSIONID=38RB5ECV10785B53AF29816E92E2E50

Te: trailers

Connection: keep-alive

PrettyRaw | Hex | php | curl | ln | Pretty

HTTP/1.1 302 Found 2022-12-03 17:38:18 GMT

Date: Sat, 03 Dec 2022 17:38:18 GMT

Server: Apache/2.4.54 (Unix) OpenSSL/1.0.2k-fips PHP/8.0.25

X-Powered-By: PHP/8.0.25

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Connection: keep-alive

Location: http://attacker.com

Set-Cookie: JSESSIONID=38C5ECV10785B53AF29816E92E2E50; Path=/; HttpOnly

Options:

A.

Application is likely to be vulnerable to Open Redirection vulnerability


B.

Application is vulnerable to Cross-Site Request Forgery vulnerability


C.

Application uses an insecure protocol


D.

All of the above


Expert Solution
Questions # 16:

Which of the following hashing algorithms is considered to be the most secure amongst these?

Options:

A.

SHA-0


B.

MD5


C.

SHA-1


D.

Bcrypt


Expert Solution
Questions # 17:

Based on the screenshot above, which of the following is the most true?

Screenshot

![Login Form]

coder@viewer

User does not exist

[Password field]

Forget password?

[Login button]

Not yet member? Sign now

Options:

A.

The application is vulnerable to username enumeration


B.

The application is vulnerable to brute-force attacks


C.

The application does not enforce a strong password policy


D.

None of the above


Expert Solution
Questions # 18:

What is the name of the WordPress file that contains the database connection information, including the database name, username, and password?

Options:

A.

wp-configuration.php


B.

wp-conf.php


C.

wp-secret.php


D.

wp-config.php


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions