Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The SecOps Group CAP Exam Questions

Exam Name: The SecOps Group Certified AppSec Practitioner Exam
Exam Code: CAP
Related Certification(s): The SecOps Group Certified Application Security Practitioner Certification
Certification Provider: The SecOps Group
Number of CAP practice questions in our database: 60 (updated: May. 05, 2026)
Expected CAP Exam Topics, as suggested by The SecOps Group :
  • Topic 1: Input Validation Mechanisms: This section assesses the proficiency of software developers in implementing input validation techniques to ensure that only properly formatted data enters a system, thereby preventing malicious inputs that could compromise application security.
  • Topic 2: Cross-Site Scripting: This segment tests the knowledge of web developers in identifying and mitigating cross-site scripting (XSS) vulnerabilities, which can enable attackers to inject malicious scripts into web pages viewed by other users.
  • Topic 3: SQL Injection: Here, database administrators are evaluated on their understanding of SQL injection attacks, where attackers exploit vulnerabilities to execute arbitrary SQL code, potentially accessing or manipulating database information.
  • Topic 4: XML External Entity Attack: This section assesses how system architects handle XML external entity (XXE) attacks, which involve exploiting vulnerabilities in XML parsers to access unauthorized data or execute malicious code.
  • Topic 5: Cross-Site Request Forgery: This part evaluates the awareness of web application developers regarding cross-site request forgery (CSRF) attacks, where unauthorized commands are transmitted from a user that the web application trusts.: Encoding, Encryption, and Hashing: Here, cryptography specialists are tested on their knowledge of encoding, encryption, and hashing techniques used to protect data integrity and confidentiality during storage and transmission.
  • Topic 6: Authentication-Related Vulnerabilities: This section examines how security consultants identify and address vulnerabilities in authentication mechanisms, ensuring that only authorized users can access system resources.
  • Topic 7: Brute Force Attacks: Here, cybersecurity analysts are assessed on their strategies to defend against brute force attacks, where attackers attempt to gain unauthorized access by systematically trying all possible passwords or keys.
  • Topic 8: Password Storage and Password Policy: This part evaluates the competence of IT administrators in implementing secure password storage solutions and enforcing robust password policies to protect user credentials.
  • Topic 9: Understanding of OWASP Top 10 Vulnerabilities: This section measures the knowledge of security professionals regarding the OWASP Top 10, a standard awareness document outlining the most critical security risks to web applications.
  • Topic 10: Security Best Practices and Hardening Mechanisms: Here, IT security managers are tested on their ability to apply security best practices and hardening techniques to reduce vulnerabilities and protect systems from potential threats.
  • Topic 11: Same Origin Policy: This segment assesses the understanding of web developers concerning the same origin policy, a critical security concept that restricts how documents or scripts loaded from one origin can interact with resources from another.: Security Headers: This part evaluates how network security engineers implement security headers in HTTP responses to protect web applications from various attacks by controlling browser behavior.
  • Topic 12: TLS Security: Here, system administrators are assessed on their knowledge of Transport Layer Security (TLS) protocols, which ensure secure communication over computer networks.
  • Topic 13: TLS Certificate Misconfiguration: This section examines the ability of network engineers to identify and correct misconfigurations in TLS certificates that could lead to security vulnerabilities.
  • Topic 14: Symmetric and Asymmetric Ciphers: This part tests the understanding of cryptographers regarding symmetric and asymmetric encryption algorithms used to secure data through various cryptographic methods.
  • Topic 15: Server-Side Request Forgery: Here, application security specialists are evaluated on their ability to detect and mitigate server-side request forgery (SSRF) vulnerabilities, where attackers can make requests from the server to unintended locations.
  • Topic 16: Authorization and Session Management Related Flaws: This section assesses how security auditors identify and address flaws in authorization and session management, ensuring that users have appropriate access levels and that sessions are securely maintained.
  • Topic 17: Insecure Direct Object Reference (IDOR): This part evaluates the knowledge of application developers in preventing insecure direct object references, where unauthorized users might access restricted resources by manipulating input parameters.
  • Topic 18: Privilege Escalation: Here, system security officers are tested on their ability to prevent privilege escalation attacks, where users gain higher access levels than permitted, potentially compromising system integrity.
  • Topic 19: Parameter Manipulation Attacks: This section examines how web security testers detect and prevent parameter manipulation attacks, where attackers modify parameters exchanged between client and server to exploit vulnerabilities.
  • Topic 20: Securing Cookies: This part assesses the competence of webmasters in implementing measures to secure cookies, protecting them from theft or manipulation, which could lead to unauthorized access.
  • Topic 21: Insecure File Uploads: Here, web application developers are evaluated on their strategies to handle file uploads securely, preventing attackers from uploading malicious files that could compromise the system.
  • Topic 22: Code Injection Vulnerabilities: This section measures the ability of software testers to identify and mitigate code injection vulnerabilities, where untrusted data is sent to an interpreter as part of a command or query.
  • Topic 23: Business Logic Flaws: This part evaluates how business analysts recognize and address flaws in business logic that could be exploited to perform unintended actions within an application.
  • Topic 24: Directory Traversal Vulnerabilities: Here, penetration testers are assessed on their ability to detect and prevent directory traversal attacks, where attackers access restricted directories and execute commands outside the web server's root directory.
  • Topic 25: Security Misconfigurations: This section examines how IT security consultants identify and rectify security misconfigurations that could leave systems vulnerable to attacks due to improperly configured settings.
  • Topic 26: Information Disclosure: This part assesses the awareness of data protection officers regarding unintentional information disclosure, where sensitive data is exposed to unauthorized parties, compromising confidentiality.
  • Topic 27: Vulnerable and Outdated Components: Here, software maintenance engineers are evaluated on their ability to identify and update vulnerable or outdated components that could be exploited by attackers to compromise the system.
  • Topic 28: Common Supply Chain Attacks and Prevention Methods: This section measures the knowledge of supply chain security analysts in recognizing common supply chain attacks and implementing preventive measures to protect against such threats.
Disscuss The SecOps Group CAP Topics, Questions or Ask Anything Related
0/2000 characters

Gary Cooper

20 days ago
During the CAP exam I found SSRF scenarios the most confusing because they mixed server-side request flow with authorization checks, and drawing request flows helped me sort the trust boundaries.
upvoted 0 times

Emma Williams

5 days ago
Yeah, that's the key insight right there—once you map out where the request actually originates versus where it ends up, the authorization piece clicks into place because you can see exactly which trust boundary the attacker is trying to cross.
upvoted 0 times
...

Daniel Thomas

10 days ago
Actually I stumbled over XXE questions where payload encoding and out-of-band exfiltration were hinted at rather than stated, and mapping the XML parser behavior clarified things.
upvoted 0 times
...

David Clark

10 days ago
Honestly the question style that combined authentication flaws with business logic forced me to think like both developer and attacker to pick the right mitigation.
upvoted 0 times
...

Justin Torres

10 days ago
However I remember a CAP practice block from The SecOps Group that blended CSRF with session fixation, and walking through token placement scenarios made those questions easier.
upvoted 0 times
...

David Davis

16 days ago
Another tricky area was the distinctions between encoding and hashing since they asked when to use percent-encoding versus cryptographic hashing in a data flow.
upvoted 0 times
Surprisingly the server misconfiguration items read more like troubleshooting tasks, so I sketched services, ports, and default files to spot risky settings.
upvoted 0 times
...
...
...

Oliva

1 month ago
I found the risk mitigation vs acceptance dilemma tough, since the line is thin. The practice tests framed it well and showed how to justify trade-offs.
upvoted 0 times
...

Blondell

1 month ago
I passed the exam, and it feels great! The Pass4Success practice questions were very helpful. There was a question on 'Information Security Risk Management Program' that asked about the key components of a risk management framework. I wasn't completely sure, but I still passed!
upvoted 0 times
...

Kami

2 months ago
Feeling accomplished after passing the exam! Thanks to Pass4Success for their practice questions. One question that puzzled me was about 'Continuous Monitoring'. It asked how to effectively implement continuous monitoring in an organization. I was unsure of the best approach, but I passed!
upvoted 0 times
...

Craig

2 months ago
I passed the exam, and I'm thrilled! The Pass4Success practice questions were a lifesaver. There was a question on 'Authorization/Approval of Information System' that asked about the process for obtaining system authorization. I wasn't entirely sure of the steps, but I managed to pass regardless!
upvoted 0 times
...

Honey

2 months ago
What a journey! Passing the exam was made easier with Pass4Success practice questions. One question that caught me off guard was about 'Assessment/Audit of Security and Privacy Controls'. It asked how to conduct an effective audit of security controls. I was a bit unsure, but I guess I did something right!
upvoted 0 times
...

Merri

2 months ago
Incident response sequence questions were a headache; ordering steps correctly was tough. After PRACTICE with Pass4Success, I could pace and justify each step.
upvoted 0 times
...

Honey

3 months ago
My hands trembled when I opened the portal, unsure I could keep up with the questions, then Pass4Success gave me structured practice and solid explanations, and I feel prepared to tackle any SecOps challenge—keep pushing forward!
upvoted 0 times
...

Floyd

3 months ago
Pass4Success practice tests were instrumental in helping me identify my knowledge gaps for the AppSec Practitioner Exam. Closing those gaps was key to my success.
upvoted 0 times
...

Annmarie

3 months ago
The “trick” on secure coding patterns and remediation paths was hard. Pass4Success practice exposed the common misapplications and the right sequences.
upvoted 0 times
...

Roslyn

3 months ago
API security quirks in the exam were killer, especially OAuth flows under constrained contexts. The practice tests walked through each variant and timing.
upvoted 0 times
...

Garry

4 months ago
Passed the AppSec exam with flying colors. Pass4Success materials were worth every penny.
upvoted 0 times
...

Macy

4 months ago
RISK scoring questions felt murky until I used Pass4Success to map scoring criteria to exam prompts; it trained me to justify every decision quickly.
upvoted 0 times
...

Tesha

4 months ago
I was able to pass the AppSec Practitioner Exam thanks to the detailed explanations in the Pass4Success practice materials. They really helped cement my understanding.
upvoted 0 times
...

Paz

4 months ago
Static analysis pitfalls were exhausting—the nuance between false positives and real defects. Pass4Success practice helped me tune my reasoning and cut through noise.
upvoted 0 times
...

Jarod

5 months ago
If you want to pass the AppSec Practitioner Exam, Pass4Success practice questions are a must. They cover all the critical topics in-depth.
upvoted 0 times
...

Louvenia

5 months ago
Nailing the AppSec Practitioner Exam was such a relief. pass4success simulations were spot-on in replicating the real thing. Highly recommend them!
upvoted 0 times
...

Rhea

5 months ago
Session management got me, particularly token invalidation and rotation questions. Pass4Success practice exams exposed edge cases I hadn’t considered and boosted confidence.
upvoted 0 times
...

Temeka

5 months ago
The tricky question style on control design gaps was brutal. pass4success practice exams highlighted common missteps and clarified why certain controls fail.
upvoted 0 times
...

Rashida

6 months ago
I struggled with threat modeling in the AppSec domain, especially identifying hidden risks in data flow; pass4success drills reproduced those tricky twists and helped me think like an assessor.
upvoted 0 times
...

Shasta

6 months ago
Definitely use Pass4Success practice tests to time yourself. Practicing under timed conditions was crucial for me to manage the exam pace.
upvoted 0 times
...

Dyan

6 months ago
Passing the AppSec Practitioner Exam was a game-changer for me. Pass4Success practice exams were key - they really helped me identify my weak spots and focus my studies.
upvoted 0 times
...

Veronika

6 months ago
The toughest part was memory-heavy attack surface mapping questions; Pass4Success practice exams drilled the exact scenarios and flagged traps I’d miss otherwise.
upvoted 0 times
...

Shantell

7 months ago
I did it! I passed the exam, and the Pass4Success questions were a big help. There was a question on 'Implementation of Security and Privacy Controls' that asked about the best practices for implementing encryption. I wasn't completely confident in my answer, but I still managed to pass!
upvoted 0 times
...

Katlyn

7 months ago
From stressed to certified AppSec Practitioner in no time. Cheers, Pass4Success!
upvoted 0 times
...

Maryann

7 months ago
Passing this exam feels amazing! Thanks to Pass4Success for their practice questions. One question that stumped me was about 'Selection and Approval of Security and Privacy Controls'. It asked which factors to consider when selecting controls for a new system. I was a bit unsure, but it all worked out in the end!
upvoted 0 times
...

Misty

7 months ago
I was jittery on exam day, worrying I'd miss a detail, but Pass4Success walked me through the material with clear drills and realistic scenarios, and now I'm confident I can apply this in real projects—you've got this, future candidates!
upvoted 0 times
...

Theresia

8 months ago
SecOps certification in the bag! Pass4Success questions were eerily similar to the real thing.
upvoted 0 times
...

Merri

8 months ago
I can't believe I passed the exam! The practice questions from Pass4Success were invaluable. There was a tricky question on the 'Scope of the Information System' that asked how to define the boundaries of an information system effectively. I wasn't entirely sure of the answer, but I guess I did well enough overall!
upvoted 0 times
...

Zana

8 months ago
Pass4Success nailed it with their exam prep. Just got certified as an AppSec Practitioner!
upvoted 0 times
...

Mitsue

8 months ago
Wow, what a relief to have passed the SecOps Group Certified AppSec Practitioner Exam! The Pass4Success practice questions were a great help. One question that really had me thinking was about the 'Information Security Risk Management Program'. It asked how to prioritize risks when multiple vulnerabilities are identified. I was unsure about the best approach, but thankfully, I managed to pass!
upvoted 0 times
...

Von

10 months ago
Thrilled to be a Certified AppSec Practitioner now. Couldn't have done it without Pass4Success!
upvoted 0 times
...

Skye

11 months ago
AppSec Practitioner exam: done and dusted! Pass4Success made cramming so much easier.
upvoted 0 times
...

Paulina

1 year ago
Feeling accomplished! Passed the SecOps cert exam. Pass4Success questions were key to my success.
upvoted 0 times
...

Barb

1 year ago
Aced the AppSec Practitioner exam today. Pass4Success materials were a lifesaver for quick prep!
upvoted 0 times
...

Jeffrey

1 year ago
Thank you for sharing your experience. It seems like a comprehensive exam.
upvoted 0 times
...

Walton

1 year ago
It truly was. I'm grateful for Pass4Success's exam prep materials. They covered all these topics and more, making my study time efficient and effective. Good luck to future Waltons!
upvoted 0 times
...

Julio

1 year ago
Just passed the SecOps Certified AppSec Practitioner exam! Thanks Pass4Success for the spot-on practice questions.
upvoted 0 times
...

Leatha

2 years ago
Passing the ISC2 Certified Authorization Professional exam was a great achievement for me, and I owe a part of it to Pass4Success practice questions. The exam included topics such as determining Information System categorization and documenting the results. One question that I recall was about capturing planned inputs, expected behavior, and expected outputs of security controls. Despite some uncertainty, I successfully passed the exam.
upvoted 0 times
...

Audry

2 years ago
My exam experience for the ISC2 Certified Authorization Professional exam was successful, thanks to Pass4Success practice questions. The roles and responsibilities in the authorization process were a key topic on the exam. One question that I remember was about describing Information System purpose and functionality. Even though I had some doubts about my answer, I managed to pass the exam.
upvoted 0 times
...

Leonora

2 years ago
Just passed the ISC2 CAP exam! Be ready for questions on risk management frameworks, especially NIST SP 800-37. You might encounter scenario-based questions about applying RMF steps to real-world situations. Focus on understanding the RMF process flow and how to tailor it to different systems. Thanks to Pass4Success for their spot-on practice questions that helped me prepare quickly!
upvoted 0 times
...

Graham

2 years ago
I recently passed the ISC2 Certified Authorization Professional exam with the help of Pass4Success practice questions. The exam covered topics such as capturing planned inputs, expected behavior, and expected outputs of security controls. One question that stood out to me was related to determining Information System categorization and documenting the results. Despite being unsure of the answer, I was able to pass the exam.
upvoted 0 times
...

Free The SecOps Group CAP Exam Actual Questions

Note: Premium Questions for CAP were last updated On May. 05, 2026 (see below)

Question #1

After purchasing an item on an e-commerce website, a user can view their order details by visiting the URL:

https://example.com/?order_id=53870

A security researcher pointed out that by manipulating the order_id value in the URL, a user can view arbitrary orders and sensitive information associated with that order_id. There are two fixes:

(Bob's Fix): In order to fix this vulnerability, a developer called Bob devised a fix so that the URL does not disclose the numeric value of the order_id but uses a SHA1 hash of the order_id in the URL, such as:

https://example.com/?order_id=1ff0fe6f1599536d1326418124a261bc98b8ea1

Note: that the SHA1 value of 53870 is 1ff0fe6f1599536d1326418124a261bc98b8ea1

(John's Fix): Another developer called John devised a different fix so that the URL does not disclose the numeric value of the order_id and uses a Base64 encoded value of the order_id in the URL, such as:

https://example.com/?order_id=NTM4NzA=

Note: that the Base64 encoded value of 53870 is NTM4NzA=

Which of the following is correct?

Reveal Solution Hide Solution
Correct Answer: B

The vulnerability described is an Insecure Direct Object Reference (IDOR), where manipulating the order_id (e.g., 53870) allows unauthorized access to other users' orders. The fixes proposed by Bob and John aim to obscure the numeric value of order_id to prevent easy guessing or manipulation:

Bob's Fix (SHA1 Hash): Replaces order_id=53870 with order_id=1ff0fe6f1599536d1326418124a261bc98b8ea1 (SHA1 hash of 53870). While this obscures the original value, an attacker can still attempt to hash potential order IDs (e.g., 53871, 53872) and test them in the URL. If the application directly uses the hash to look up the order without validating the user's authorization, the vulnerability persists. SHA1 is a one-way hash, but it does not inherently enforce access control.

John's Fix (Base64 Encoding): Replaces order_id=53870 with order_id=NTM4NzA= (Base64 encoding of 53870). Base64 is a reversible encoding, and an attacker can easily decode NTM4NzA= back to 53870 using standard tools. If the application decodes it and uses the original value to fetch orders without authorization checks, the IDOR vulnerability remains.

Evaluation: Both fixes address the symptom (disclosing the numeric value) but fail to address the root cause: lack of authorization validation. The application must ensure that only the authenticated user can access their own orders, regardless of the order_id format (numeric, hashed, or encoded). Neither fix includes such a check, so the vulnerability persists.

Option A ('Both solutions are adequate to fix the problem'): Incorrect, as neither solution enforces authorization.

Option B ('Both solutions are inadequate and the vulnerability is still not fixed'): Correct, as both SHA1 hashing and Base64 encoding are superficial changes that do not prevent unauthorized access.

Option C ('Only John's solution fixes the problem'): Incorrect, as John's Base64 encoding is reversible and does not fix the IDOR issue.

Option D ('Only Bob's solution fixes the problem'): Incorrect, as Bob's SHA1 hashing also does not address the authorization flaw.

The correct answer is B, aligning with the CAP syllabus under 'Insecure Direct Object Reference (IDOR)' and 'Access Control Best Practices.'


Question #2

Which of the following is a common attack in the context of SAML security?

Reveal Solution Hide Solution
Correct Answer: D

SAML (Security Assertion Markup Language) is an XML-based standard for authentication and authorization, commonly used for single sign-on (SSO). Its reliance on XML and the complexity of its trust model make it vulnerable to several attacks:

Option A ('XML Signature Wrapping Attack'): This is a common SAML attack where an attacker manipulates the XML structure to wrap a malicious element while preserving the signature, tricking the relying party into accepting a forged assertion. This attack exploits the way SAML parsers handle signed XML messages.

Option B ('XML External Entity Injection'): SAML messages are XML-based, making them susceptible to XXE (XML External Entity) attacks if the XML parser is misconfigured. An attacker can include external entities to access local files or make network requests, compromising the system.

Option C ('Assertion Replay Attack'): In this attack, an attacker intercepts a valid SAML assertion and reuses it to impersonate the user. If the assertion lacks proper replay protection (e.g., timestamps, nonces), the relying party may accept the replayed assertion as valid.

Option D ('All of the above'): Correct, as all three attacks (XML Signature Wrapping, XXE Injection, and Assertion Replay) are well-documented vulnerabilities in SAML implementations.

The correct answer is D, aligning with the CAP syllabus under 'SAML Security' and 'XML-Based Attacks.'


Question #3

While performing a security audit of a web application, you discovered an exposed docker-compose.yml file. What is the significance of this file and what data can be found in it?

Reveal Solution Hide Solution
Correct Answer: C

A docker-compose.yml file is a YAML-formatted configuration file used with Docker Compose, a tool for defining and running multi-container Docker applications. Its primary significance lies in orchestrating the deployment of Docker containers by specifying services (e.g., web server, database), networks (e.g., internal communication), and volumes (e.g., persistent storage). An exposed docker-compose.yml file poses a security risk because it may reveal sensitive configuration details, such as service names, ports, environment variables (e.g., database credentials), and network settings, which attackers could exploit to target the application.

Option A ('The docker-compose.yml file is a YAML file that contains the application source code'): Incorrect, as this file defines configuration and orchestration, not source code.

Option B ('The docker-compose.yml file is a YAML file that contains the server logs and user session information...'): Incorrect, as logs and session data are stored elsewhere (e.g., in container logs or databases), not in docker-compose.yml.

Option C ('The docker-compose.yml file is a YAML file that is used to define the services, networks, and volumes...'): Correct, as it accurately describes the file's purpose and content, including configuration and dependencies, which are critical for Docker applications.

Option D ('The docker-compose.yml file is a YAML file that contains the configuration of load balancers and firewalls'): Incorrect, as it focuses only on load balancers and firewalls, which are specific components and not the primary focus of the file.

The correct answer is C, aligning with the CAP syllabus under 'Container Security' and 'Configuration Management.'


Question #4

In the screenshot below, which of the following is incorrect?

Target: https://example.com

HTTP/1.1 404 Not Found

Date: Fri, 09 Dec 2022 18:03:49 GMT

Server: Apache

Vary: Cookie

X-Powered-By: PHP/5.4.5-5

X-Xss-Protection: 1; mode=block

X-Content-Type-Options: nosniff

Content-Length: 0

Content-Type: text/html; charset=UTF-8

Cookie: JSESSIONID=1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789; secure; HttpOnly; SameSite=None

Reveal Solution Hide Solution
Correct Answer: A

The screenshot shows an HTTP response header from https://example.com with a 404 status. Let's evaluate each option:

Option A ('The application discloses the framework name and version'): The X-Powered-By: PHP/5.4.5-5 header reveals the server is running PHP version 5.4.5-5, which is a security risk as it exposes the framework and version. This information can help attackers identify known vulnerabilities, making A incorrect (i.e., it is a problem).

Option B ('The application reveals user-agent details'): The response does not include user-agent details; it only shows the server's configuration. User-agent details are part of the request, not the response, so this is incorrect (not a problem here).

Option C ('A cookie is set with HttpOnly and a Secure flag'): The Cookie header includes HttpOnly and Secure attributes, which are best practices to prevent JavaScript access and ensure transmission over HTTPS, respectively. This is correct behavior, so it is not incorrect.

Option D ('The application accepts insecure protocol'): The response uses https://, indicating a secure protocol (TLS), and there's no evidence of accepting insecure protocols like HTTP. This is not incorrect.

Thus, the incorrect statement is A, as disclosing the framework name and version via X-Powered-By is a security misconfiguration. This aligns with the CAP syllabus under 'Security Headers' and 'Information Disclosure.'


Question #5

In the context of the CORS (Cross-origin resource sharing) misconfiguration, which of the following statements is true?

Reveal Solution Hide Solution
Correct Answer: A

CORS (Cross-Origin Resource Sharing) is a mechanism that allows servers to specify which origins can access their resources, enhancing security for cross-origin requests. A common misconfiguration occurs with the Access-Control-Allow-Origin and Access-Control-Allow-Credentials headers. When Access-Control-Allow-Origin is set to * (wildcard, allowing all origins), it permits any domain to make requests. However, if Access-Control-Allow-Credentials is set to true (allowing credentials like cookies or HTTP authentication), this creates a security risk. Browsers will block such requests because sending credentials with a wildcard origin violates CORS security policies, but an attacker could exploit this misconfiguration to trick a victim's browser into making unauthorized requests if other controls are absent.

Option A is correct because the combination of Access-Control-Allow-Origin: * and Access-Control-Allow-Credentials: true is exploitable, as it enables potential credential leakage or unauthorized access. Option B is incorrect because Access-Control-Allow-Credentials: false disables credential sending, reducing exploitability. Option C is incorrect because the value of Access-Control-Allow-Credentials is not irrelevant; it must be false with a wildcard origin to comply with security standards. Option D ('All of the above') is incorrect as only A holds true. This is a key topic in the CAP syllabus under 'CORS Misconfiguration' and 'Client-Side Security.'



Unlock Premium CAP Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now

Save Cancel