Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :May 14, 2024

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 31:

    A security company is developing a new cloud-based log analytics platform. Its purpose is to allow:

    Customers to upload their log files to the "big data" platform Customers to perform remote log search

    Customers to integrate into the platform using an API so that third party business intelligence tools can be used for the purpose of trending, insights, and/or discovery

    Which of the following are the BEST security considerations to protect data from one customer being disclosed to other customers? (Select THREE).

    A. Secure storage and transmission of API keys

    B. Secure protocols for transmission of log files and search results

    C. At least two years retention of log files in case of e-discovery requests

    D. Multi-tenancy with RBAC support

    E. Sanitizing filters to prevent upload of sensitive log file contents

    F. Encryption of logical volumes on which the customers' log files reside

  • Question 32:

    Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices?

    A. Single sign-on

    B. Identity propagation

    C. Remote attestation

    D. Secure code review

  • Question 33:

    The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy system operational for the next two years. The legacy system is out of support because the vendor and security patches are no longer released. Additionally, this is a proprietary embedded system and little is documented and known about it. Which of the following should the Information Technology department implement to reduce the security risk from a compromise of this system?

    A. Virtualize the system and migrate it to a cloud provider.

    B. Segment the device on its own secure network.

    C. Install an antivirus and HIDS on the system.

    D. Hire developers to reduce vulnerabilities in the code.

  • Question 34:

    A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. Which of the following is the MOST cost effective way for the university to securely handle student registration?

    A. Virtualize the web servers locally to add capacity during registration.

    B. Move the database servers to an elastic private cloud while keeping the web servers local.

    C. Move the database servers and web servers to an elastic private cloud.

    D. Move the web servers to an elastic public cloud while keeping the database servers local.

  • Question 35:

    An organization has several production critical SCADA supervisory systems that cannot follow the normal 30-day patching policy. Which of the following BEST maximizes the protection of these systems from malicious software?

    A. Configure a firewall with deep packet inspection that restricts traffic to the systems

    B. Configure a separate zone for the systems and restrict access to known ports

    C. Configure the systems to ensure only necessary applications are able to run

    D. Configure the host firewall to ensure only the necessary applications have listening ports

  • Question 36:

    A security administrator is tasked with increasing the availability of the storage networks while enhancing the performance of existing applications. Which of the following technologies should the administrator implement to meet these goals? (Select TWO).

    A. LUN masking

    B. Snapshots

    C. vSAN

    D. Dynamic disk pools

    E. Multipath

    F. Deduplication

  • Question 37:

    A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator instead suggests that the developers:

    A. Create a custom standard to define the data.

    B. Use well formed standard compliant XML and strict schemas.

    C. Only document the data format in the parsing application code.

    D. Implement a de facto corporate standard for all analyzed data.

  • Question 38:

    A trucking company delivers products all over the country. The executives at the company would like to have better insight into the location of their drivers to ensure the shipments are following secure routes. Which of the following would BEST help the executives meet this goal?

    A. Install GSM tracking on each product for end-to-end delivery visibility.

    B. Implement geo-fencing to track products.

    C. Require drivers to geo-tag documentation at each delivery location.

    D. Equip each truck with an RFID tag for location services.

  • Question 39:

    The IT director has charged the company helpdesk with sanitizing fixed and removable media. The helpdesk manager has written a new procedure to be followed by the helpdesk staff. This procedure includes the current standard to be used for data sanitization, as well as the location of physical degaussing tools. In which of the following cases should the helpdesk staff use the new procedure? (Select THREE).

    A. During asset disposal

    B. While reviewing the risk assessment

    C. While deploying new assets

    D. Before asset repurposing

    E. After the media has been disposed of

    F. During the data classification process

    G. When installing new printers

    H. When media fails or is unusable

  • Question 40:

    A member of the software development team has requested advice from the security team to implement a new secure lab for testing malware. Which of the following is the NEXT step that the security team should take?

    A. Purchase new hardware to keep the malware isolated.

    B. Develop a policy to outline what will be required in the secure lab.

    C. Construct a series of VMs to host the malware environment.

    D. Create a proposal and present it to management for approval.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.