Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Apr 25, 2024

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 1:

    A new IT company has hired a security consultant to implement a remote access system, which will enable employees to telecommute from home using both company issued as well as personal computing devices, including mobile devices. The company wants a flexible system to provide confidentiality and integrity for data in transit to the company's internally developed application GUI. Company policy prohibits employees from having administrative rights to company issued devices. Which of the following remote access solutions has the lowest technical complexity?

    A. RDP server

    B. Client-based VPN

    C. IPSec

    D. Jump box

    E. SSL VPN

  • Question 2:

    Company A needs to export sensitive data from its financial system to company B's database, using company B's API in an automated manner. Company A's policy prohibits the use of any intermediary external systems to transfer or store its sensitive data, therefore the transfer must occur directly between company A's financial system and company B's destination server using the supplied API. Additionally, company A's legacy financial software does not support encryption, while company B's API supports encryption. Which of the following will provide end-to-end encryption for the data transfer while adhering to these requirements?

    A. Company A must install an SSL tunneling software on the financial system.

    B. Company A's security administrator should use an HTTPS capable browser to transfer the data.

    C. Company A should use a dedicated MPLS circuit to transfer the sensitive data to company B.

    D. Company A and B must create a site-to-site IPSec VPN on their respective firewalls.

  • Question 3:

    Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?

    A. The company should develop an in-house solution and keep the algorithm a secret.

    B. The company should use the CEO's encryption scheme.

    C. The company should use a mixture of both systems to meet minimum standards.

    D. The company should use the method recommended by other respected information security organizations.

  • Question 4:

    VPN users cannot access the active FTP server through the router but can access any server in the data center. Additional network information: DMZ network – 192.168.5.0/24 (FTP server is 192.168.5.11) VPN network – 192.168.1.0/24 Datacenter – 192.168.2.0/24 User network - 192.168.3.0/24 HR network – 192.168.4.0/24\ Traffic shaper configuration: VLANBandwidth Limit (Mbps) VPN50 User175 HR250 Finance250 Guest0 Router ACL: ActionSourceDestination Permit192.168.1.0/24192.168.2.0/24 Permit192.168.1.0/24192.168.3.0/24 Permit192.168.1.0/24192.168.5.0/24 Permit192.168.2.0/24192.168.1.0/24 Permit192.168.3.0/24192.168.1.0/24 Permit192.168.5.1/32192.168.1.0/24 Deny192.168.4.0/24192.168.1.0/24 Deny192.168.1.0/24192.168.4.0/24 Denyanyany

    Which of the following solutions would allow the users to access the active FTP server?

    A. Add a permit statement to allow traffic from 192.168.5.0/24 to the VPN network

    B. Add a permit statement to allow traffic to 192.168.5.1 from the VPN network

    C. IPS is blocking traffic and needs to be reconfigured

    D. Configure the traffic shaper to limit DMZ traffic

    E. Increase bandwidth limit on the VPN network

  • Question 5:

    In order to reduce costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections to the corporate enterprise from personal devices; provided they are on an approved device list. Which of the following security measures would be MOST effective in securing the enterprise under the new policy? (Select TWO).

    A. Provide free email software for personal devices.

    B. Encrypt data in transit for remote access.

    C. Require smart card authentication for all devices.

    D. Implement NAC to limit insecure devices access.

    E. Enable time of day restrictions for personal devices.

  • Question 6:

    An IT manager is working with a project manager from another subsidiary of the same multinational organization. The project manager is responsible for a new software development effort that is being outsourced overseas, while customer acceptance testing will be performed in house. Which of the following capabilities is MOST likely to cause issues with network availability?

    A. Source code vulnerability scanning

    B. Time-based access control lists

    C. ISP to ISP network jitter

    D. File-size validation

    E. End to end network encryption

  • Question 7:

    An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO).

    A. The company's IDS signatures were not updated.

    B. The company's custom code was not patched.

    C. The patch caused the system to revert to http.

    D. The software patch was not cryptographically signed.

    E. The wrong version of the patch was used.

    F. Third-party plug-ins were not patched.

  • Question 8:

    A company is deploying a new iSCSI-based SAN. The requirements are as follows:

    SAN nodes must authenticate each other.

    Shared keys must NOT be used.

    Do NOT use encryption in order to gain performance.

    Which of the following design specifications meet all the requirements? (Select TWO).

    A. Targets use CHAP authentication

    B. IPSec using AH with PKI certificates for authentication

    C. Fiber channel should be used with AES

    D. Initiators and targets use CHAP authentication

    E. Fiber channel over Ethernet should be used

    F. IPSec using AH with PSK authentication and 3DES

    G. Targets have SCSI IDs for authentication

  • Question 9:

    A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important, which of the following scenarios should they consider?

    A. Offload some data processing to a public cloud

    B. Aligning their client intake with the resources available

    C. Using a community cloud with adequate controls

    D. Outsourcing the service to a third party cloud provider

  • Question 10:

    A system administrator has just installed a new Linux distribution. The distribution is configured to be "secure out of the box". The system administrator cannot make updates to certain system files and services. Each time changes are attempted, they are denied and a system error is generated. Which of the following troubleshooting steps should the security administrator suggest?

    A. Review settings in the SELinux configuration files

    B. Reset root permissions on systemd files

    C. Perform all administrative actions while logged in as root

    D. Disable any firewall software before making changes

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.