Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :May 14, 2024

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 21:

    A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS server. New company policies require a second factor of authentication, and the Information Security Officer has selected PKI as the second factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor and ensure that no error messages are displayed to the user during the VPN connection? (Select TWO).

    A. The user's certificate private key must be installed on the VPN concentrator.

    B. The CA's certificate private key must be installed on the VPN concentrator.

    C. The user certificate private key must be signed by the CA.

    D. The VPN concentrator's certificate private key must be signed by the CA and installed on the VPN concentrator.

    E. The VPN concentrator's certificate private key must be installed on the VPN concentrator.

    F. The CA's certificate public key must be installed on the VPN concentrator.

  • Question 22:

    Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?

    A. Deploy inline network encryption devices

    B. Install an SSL acceleration appliance

    C. Require all core business applications to use encryption

    D. Add an encryption module to the router and configure IPSec

  • Question 23:

    In an effort to minimize costs, the management of a small candy company wishes to explore a cloud service option for the development of its online applications. The company does not wish to invest heavily in IT infrastructure. Which of the following solutions should be recommended?

    A. A public IaaS

    B. A public PaaS

    C. A public SaaS

    D. A private SaaS

    E. A private IaaS

    F. A private PaaS

  • Question 24:

    Three companies want to allow their employees to seamlessly connect to each other's wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companies' wireless network. All three companies have agreed to standardize on 802.1x EAP-PEAP-MSCHAPv2 for client configuration. Which of the following should the three companies implement?

    A. The three companies should agree on a single SSID and configure a hierarchical RADIUS system which implements trust delegation.

    B. The three companies should implement federated authentication through Shibboleth connected to an LDAP backend and agree on a single SSID.

    C. The three companies should implement a central portal-based single sign-on and agree to use the same CA when issuing client certificates.

    D. All three companies should use the same wireless vendor to facilitate the use of a shared cloud based wireless controller.

  • Question 25:

    An administrator is implementing a new network-based storage device. In selecting a storage protocol, the administrator would like the data in transit's integrity to be the most important concern. Which of the following protocols meets these needs by implementing either AES-CMAC or HMAC-SHA256 to sign data?

    A. SMB

    B. NFS

    C. FCoE

    D. iSCSI

  • Question 26:

    An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the-middle attack. Which of the following controls should be implemented to mitigate the attack in the future?

    A. Use PAP for secondary authentication on each RADIUS server

    B. Disable unused EAP methods on each RADIUS server

    C. Enforce TLS connections between RADIUS servers

    D. Use a shared secret for each pair of RADIUS servers

  • Question 27:

    A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems.

    Which of the following is the solutions architect MOST likely trying to implement?

    A. One time pads

    B. PKI

    C. Quantum cryptography

    D. Digital rights management

  • Question 28:

    A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via an HTTP intercepting proxy are failing with SSL errors. Which of the following controls has likely been implemented by the developers?

    A. SSL certificate revocation

    B. SSL certificate pinning

    C. Mobile device root-kit detection

    D. Extended Validation certificates

  • Question 29:

    An IT Manager is concerned about errors made during the deployment process for a new model of tablet. Which of the following would suggest best practices and configuration parameters that technicians could follow during the deployment process?

    A. Automated workflow

    B. Procedure

    C. Corporate standard

    D. Guideline

    E. Policy

  • Question 30:

    Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare, education, and manufacturing. The security architect for company XYZ is reviewing a vendor proposal to reduce company XYZ's hardware costs by combining multiple physical hosts through the use of virtualization technologies. The security architect notes concerns about data separation, confidentiality, regulatory requirements concerning PII, and administrative complexity on the proposal. Which of the following BEST describes the core concerns of the security architect?

    A. Most of company XYZ's customers are willing to accept the risks of unauthorized disclosure and access to information by outside users.

    B. The availability requirements in SLAs with each hosted customer would have to be re- written to account for the transfer of virtual machines between physical platforms for regular maintenance.

    C. Company XYZ could be liable for disclosure of sensitive data from one hosted customer when accessed by a malicious user who has gained access to the virtual machine of another hosted customer.

    D. Not all of company XYZ's customers require the same level of security and the administrative complexity of maintaining multiple security postures on a single hypervisor negates hardware cost savings.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.