New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CAP Exam - Topic 3 Question 69 Discussion

Actual exam question for ISC2's CAP exam
Question #: 69
Topic #: 3
[All CAP Questions]

Which of the following is a common attack in the context of SAML security?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Emiko
3 months ago
XML External Entity Injection is a big one too!
upvoted 0 times
...
Melissa
3 months ago
Wait, are all these really common? That’s surprising!
upvoted 0 times
...
Susy
4 months ago
All of the above sounds right to me.
upvoted 0 times
...
Jerry
4 months ago
I think Assertion Replay Attack is more common.
upvoted 0 times
...
Tiera
4 months ago
Definitely XML Signature Wrapping Attack!
upvoted 0 times
...
Noble
4 months ago
I’m leaning towards D, all of the above, since they all seem like plausible attacks in the context of SAML security.
upvoted 0 times
...
Christoper
4 months ago
I feel like all of these options could be relevant, but I need to double-check if XML External Entity Injection is specifically tied to SAML.
upvoted 0 times
...
Sherman
5 months ago
I think Assertion Replay Attacks were mentioned in a practice question, but I can't recall if they were the most common.
upvoted 0 times
...
Stefany
5 months ago
I remember studying XML Signature Wrapping attacks, but I'm not sure if that's the only one we need to worry about in SAML.
upvoted 0 times
...
Myra
5 months ago
Hmm, I'm not totally sure about this one. I know ISO 26000 is different from other ISO standards, but I can't remember the exact details. I'll have to think it through carefully.
upvoted 0 times
...
Mabel
5 months ago
Okay, let's see. If Sarah was truly ignorant of the copyright infringement, then I believe she would not be guilty under the law. But I'll need to double-check the details on that.
upvoted 0 times
...
Stephanie
5 months ago
Okay, let me think this through. The conflict is between two different functional areas, not between different levels of management, so I don't think "vertical conflict" is the right answer. I'm leaning towards "horizontal conflict" as the best description of the situation.
upvoted 0 times
...
Antione
5 months ago
I remember studying something about data tiering yesterday, but I'm not completely sure if it's related to the issues in this scenario.
upvoted 0 times
...
Beckie
10 months ago
Assertion Replay Attack, huh? Guess I'll have to brush up on my SAML security knowledge before the exam. Time to hit the books!
upvoted 0 times
Bong
8 months ago
D) All of the above
upvoted 0 times
...
Edna
8 months ago
C) Assertion Replay Attack
upvoted 0 times
...
Coleen
8 months ago
B) XML External Entity Injection
upvoted 0 times
...
Emogene
8 months ago
A) XML Signature Wrapping Attack
upvoted 0 times
...
Dominque
8 months ago
D) All of the above
upvoted 0 times
...
Tess
9 months ago
C) Assertion Replay Attack
upvoted 0 times
...
Shawana
9 months ago
B) XML External Entity Injection
upvoted 0 times
...
Raelene
9 months ago
A) XML Signature Wrapping Attack
upvoted 0 times
...
Fredric
9 months ago
C) Assertion Replay Attack
upvoted 0 times
...
Bulah
9 months ago
B) XML External Entity Injection
upvoted 0 times
...
Edwin
9 months ago
A) XML Signature Wrapping Attack
upvoted 0 times
...
...
Jacinta
10 months ago
I'm not sure, but I think D) All of the above makes sense because all those attacks are common in SAML security.
upvoted 0 times
...
Helene
10 months ago
XML Signature Wrapping Attack? Sounds like a villain from a superhero movie. I can't wait to learn more about that one!
upvoted 0 times
Alona
9 months ago
Definitely! It's important to understand these attacks to protect against them.
upvoted 0 times
...
Renay
9 months ago
I know, right? It does sound like a villain! But it's actually a serious security threat.
upvoted 0 times
...
An
9 months ago
D) All of the above
upvoted 0 times
...
Carylon
9 months ago
C) Assertion Replay Attack
upvoted 0 times
...
Crissy
10 months ago
B) XML External Entity Injection
upvoted 0 times
...
Franchesca
10 months ago
A) XML Signature Wrapping Attack
upvoted 0 times
...
...
Isabella
10 months ago
I disagree, I believe the correct answer is C) Assertion Replay Attack.
upvoted 0 times
...
Reid
10 months ago
I think the answer is A) XML Signature Wrapping Attack.
upvoted 0 times
...
Viola
10 months ago
But D) All of the above seems like a safer choice, covering all possible attacks.
upvoted 0 times
...
Bernadine
10 months ago
Honestly, I feel like 'All of the above' is the way to go here. Gotta cover all your bases when it comes to SAML, you know?
upvoted 0 times
...
Cassie
11 months ago
Ah, the eternal battle against SAML security vulnerabilities! I bet some hackers are just itching to try out those juicy attack vectors.
upvoted 0 times
...
Laurel
11 months ago
I believe it could also be C) Assertion Replay Attack.
upvoted 0 times
...
Viola
11 months ago
I think the answer is A) XML Signature Wrapping Attack.
upvoted 0 times
...

Save Cancel