Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 11:

    Company XYZ provides cable television services to several regional areas. They are currently installing fiber-to-the-home in many areas with hopes of also providing telephone and Internet services. The telephone and Internet services portions of the company will each be separate subsidiaries of the parent company. The board of directors wishes to keep the subsidiaries separate from the parent company. However all three companies must share customer data for the purposes of accounting, billing, and customer authentication. The solution must use open standards, and be simple and seamless for customers, while only sharing minimal data between the companies. Which of the following solutions is BEST suited for this scenario?

    A. The companies should federate, with the parent becoming the SP, and the subsidiaries becoming an IdP.

    B. The companies should federate, with the parent becoming the IdP, and the subsidiaries becoming an SSP.

    C. The companies should federate, with the parent becoming the IdP, and the subsidiaries becoming an SP.

    D. The companies should federate, with the parent becoming the ASP, and the subsidiaries becoming an IdP.

  • Question 12:

    Two universities are making their 802.11n wireless networks available to the other university's students. The infrastructure will pass the student's credentials back to the home school for authentication via the Internet.

    The requirements are:

    Mutual authentication of clients and authentication server

    The design should not limit connection speeds

    Authentication must be delegated to the home school No passwords should be sent unencrypted

    The following design was implemented:

    WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security

    RADIUS proxy servers will be used to forward authentication requests to the home school

    The RADIUS servers will have certificates from a common public certificate authority

    A strong shared secret will be used for RADIUS server authentication

    Which of the following security considerations should be added to the design?

    A. The transport layer between the RADIUS servers should be secured

    B. WPA Enterprise should be used to decrease the network overhead

    C. The RADIUS servers should have local accounts for the visiting students

    D. Students should be given certificates to use for authentication to the network

  • Question 13:

    A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to the domain names and infrastructure. Which of the following security goals does this meet? (Select TWO).

    A. Availability

    B. Authentication

    C. Integrity

    D. Confidentiality

    E. Encryption

  • Question 14:

    A port in a fibre channel switch failed, causing a costly downtime on the company's primary website. Which of the following is the MOST likely cause of the downtime?

    A. The web server iSCSI initiator was down.

    B. The web server was not multipathed.

    C. The SAN snapshots were not up-to-date.

    D. The SAN replication to the backup site failed.

  • Question 15:

    Two separate companies are in the process of integrating their authentication infrastructure into a unified single sign-on system. Currently, both companies use an AD backend and two factor authentication using TOTP. The system administrators have configured a trust relationship between the authentication backend to ensure proper process flow. How should the employees request access to shared resources before the authentication integration is complete?

    A. They should logon to the system using the username concatenated with the 6-digit code and their original password.

    B. They should logon to the system using the newly assigned global username: first.lastname#### where #### is the second factor code.

    C. They should use the username format: LAN\first.lastname together with their original password and the next 6-digit code displayed when the token button is depressed.

    D. They should use the username format: [email protected], together with a password and their 6-digit code.

  • Question 16:

    Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?

    A. Aggressive patch management on the host and guest OSs.

    B. Host based IDS sensors on all guest OSs.

    C. Different antivirus solutions between the host and guest OSs.

    D. Unique Network Interface Card (NIC) assignment per guest OS.

  • Question 17:

    After reviewing a company's NAS configuration and file system access logs, the auditor is advising the security administrator to implement additional security controls on the NFS export. The security administrator decides to remove the no_root_squash directive from the export and add the nosuid directive. Which of the following is true about the security controls implemented by the security administrator?

    A. The newly implemented security controls are in place to ensure that NFS encryption can only be controlled by the root user.

    B. Removing the no_root_squash directive grants the root user remote NFS read/write access to important files owned by root on the NAS.

    C. Users with root access on remote NFS client computers can always use the SU command to modify other user's files on the NAS.

    D. Adding the nosuid directive disables regular users from accessing files owned by the root user over NFS even after using the SU command.

  • Question 18:

    A software developer and IT administrator are focused on implementing security in the organization to protect OSI layer 7. Which of the following security technologies would BEST meet their requirements? (Select TWO).

    A. NIPS

    B. HSM

    C. HIPS

    D. NIDS

    E. WAF

  • Question 19:

    An organization would like to allow employees to use their network username and password to access a third-party service. The company is using Active Directory Federated Services for their directory service. Which of the following should the company ensure is supported by the third-party? (Select TWO).

    A. LDAP/S

    B. SAML

    C. NTLM

    D. OAUTH

    E. Kerberos

  • Question 20:

    A company is trying to decide how to manage hosts in a branch location connected via a slow WAN link. The company desires to provide the same level of performance and functionality to the branch office as it provides to the main campus. The company uses Active Directory for its directory service and host configuration management. The branch location does not have a datacenter, and the physical security posture of the building is weak. Which of the following designs is MOST appropriate for this scenario?

    A. Deploy a branch location Read-Only Domain Controller in the DMZ at the main campus with a two-way trust.

    B. Deploy a corporate Read-Only Domain Controller to the branch location.

    C. Deploy a corporate Domain Controller in the DMZ at the main campus.

    D. Deploy a branch location Read-Only Domain Controller to the branch office location with a one-way trust.

    E. Deploy a corporate Domain Controller to the branch location.

    F. Deploy a branch location Domain Controller to the branch location with a one-way trust.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.