1. Home
  2. The SecOps Group
  3. The SecOps Group Certified Application Security Practitioner
  4. CAP Exam Info

The SecOps Group CAP Exam Questions - Navigate Your Path to Success

The The SecOps Group Certified AppSec Practitioner Exam (CAP) exam is a good choice for SecOps Application security engineers Application Developers SOC analysts and if the candidate manages to pass The SecOps Group Certified AppSec Practitioner Exam, he/she will earn The SecOps Group Certified Application Security Practitioner Certification. Below are some essential facts for The SecOps Group CAP exam candidates:

  • TrendyCerts offers 60 Questions that are based on actual The SecOps Group CAP syllabus.
  • Our The SecOps Group CAP Exam Practice Questions were last updated on: Mar 11, 2025

Sample Questions for The SecOps Group CAP Exam Preparation

Question 1

The following request is vulnerable to Cross-Site Request Forgery vulnerability.

POST /changepassword HTTP/2 Host: example.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) rv:107.0) Gecko/20100101 Firefox/107.0 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Cookie: JSESSIONID=38RC5ECV10785B53AF19816E92E2E50 Content-Length: 95

new_password=lov3MyPiano23&confirm_password=lov3MyPiano23

Correct : A

Cross-Site Request Forgery (CSRF) occurs when an attacker tricks a user's browser into making an unintended request to a site where the user is authenticated, potentially performing actions like changing a password. Let's analyze the request:

The request is a POST to /changepassword with a Cookie: JSESSIONID, indicating the user is authenticated via a session. The Content-Length: 95 and payload (new_password=lov3MyPiano23&confirm_password=lov3MyPiano23) suggest a state-changing operation (password change).

CSRF vulnerability arises when the request lacks a unique, unpredictable token to validate its legitimacy, and the server accepts it based solely on the session cookie. The request includes no CSRF token (e.g., in the body or headers like X-CSRF-Token).

The Sec-Fetch-Site: same-origin header indicates the request originates from the same domain, but this is a browser feature and does not guarantee server-side protection against CSRF from a malicious site (e.g., via a hidden iframe or form submission).

Without a CSRF token, an attacker could craft a malicious HTML page with a form that submits this exact request when a victim visits their site while authenticated to example.com, exploiting the browser's automatic inclusion of the JSESSIONID cookie. This is a textbook CSRF vulnerability.

Option A ('True'): Correct, as the request lacks a CSRF token, making it vulnerable to CSRF attacks.

Option B ('False'): Incorrect, as the absence of a CSRF token indicates vulnerability.

The correct answer is A, aligning with the CAP syllabus under 'Cross-Site Request Forgery (CSRF)' and 'Session Management.'


Options Selected by Other Users:
Question 2

A website administrator forgot to renew the TLS certificate on time and as a result, the application is now displaying a TLS error message. However, on closer inspection, it appears that the error is due to the TLS certificate expiry.

Which of the following is correct?

Correct : B

A TLS certificate expiry means the certificate used to secure the HTTPS connection is no longer valid, typically due to its expiration date being passed. This triggers a TLS error message in the browser (e.g., 'Your connection is not private'). Let's evaluate the options:

Option A ('There is no urgency to renew the certificate as the communication is still over TLS'): Incorrect. While the communication may technically still occur over TLS (depending on browser and server behavior), an expired certificate breaks the trust model. Browsers will warn users, and some may block access entirely. The communication is not secure in the sense that the certificate's validity cannot be verified, potentially exposing users to risks if they bypass warnings. This is not a valid justification for delaying renewal.

Option B ('There is an urgency to renew the certificate as the users of the website may get conditioned to ignore TLS warnings and therefore ignore a legitimate warning which could be a real Man-in-the-Middle attack'): Correct. An expired TLS certificate causes repeated warnings, which may desensitize users to ignore them. If a real Man-in-the-Middle (MitM) attack occurs (e.g., an attacker presents a fake certificate), users accustomed to bypassing warnings might not notice, increasing the risk of data interception. Renewing the certificate is urgent to restore trust and prevent this conditioning effect, aligning with security best practices.

The correct answer is B, aligning with the CAP syllabus under 'TLS Configuration' and 'Certificate Management.'


Options Selected by Other Users:
The SecOps Group CAP