Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :May 14, 2024

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 41:

    An information security assessor for an organization finished an assessment that identified critical issues with the human resource new employee management software application. The assessor submitted the report to senior management but nothing has happened. Which of the following would be a logical next step?

    A. Meet the two key VPs and request a signature on the original assessment.

    B. Include specific case studies from other organizations in an updated report.

    C. Schedule a meeting with key human resource application stakeholders.

    D. Craft an RFP to begin finding a new human resource application.

  • Question 42:

    Customer Need:

    "We need the system to produce a series of numbers with no discernible mathematical progression for use by our Java based, PKI-enabled, customer facing website."

    Which of the following BEST restates the customer need?

    A. The system shall use a pseudo-random number generator seeded the same every time.

    B. The system shall generate a pseudo-random number upon invocation by the existing Java program.

    C. The system shall generate a truly random number based upon user PKI certificates.

    D. The system shall implement a pseudo-random number generator for use by corporate customers.

  • Question 43:

    The risk committee has endorsed the adoption of a security system development life cycle (SSDLC) designed to ensure compliance with PCI-DSS, HIPAA, and meet the organization's mission. Which of the following BEST describes the correct order of implementing a five phase SSDLC?

    A. Initiation, assessment/acquisition, development/implementation, operations/maintenance and sunset.

    B. Initiation, acquisition/development, implementation/assessment, operations/maintenance and sunset.

    C. Assessment, initiation/development, implementation/assessment, operations/maintenance and disposal.

    D. Acquisition, initiation/development, implementation/assessment, operations/maintenance and disposal.

  • Question 44:

    A facilities manager has observed varying electric use on the company's metered service lines. The facility management rarely interacts with the IT department unless new equipment is being delivered. However, the facility manager thinks that there is a correlation between spikes in electric use and IT department activity. Which of the following business processes and/or practices would provide better management of organizational resources with the IT department's needs? (Select TWO).

    A. Deploying a radio frequency identification tagging asset management system

    B. Designing a business resource monitoring system

    C. Hiring a property custodian

    D. Purchasing software asset management software

    E. Facility management participation on a change control board

    F. Rewriting the change board charter

    G. Implementation of change management best practices

  • Question 45:

    A company sales manager received a memo from the company's financial department which stated that the company would not be putting its software products through the same security testing as previous years to reduce the research and development cost by 20 percent for the upcoming year. The memo also stated that the marketing material and service level agreement for each product would remain unchanged. The sales manager has reviewed the sales goals for the upcoming year and identified an increased target across the software products that will be affected by the financial department's change. All software products will continue to go through new development in the coming year. Which of the following should the sales manager do to ensure the company stays out of trouble?

    A. Discuss the issue with the software product's user groups

    B. Consult the company's legal department on practices and law

    C. Contact senior finance management and provide background information

    D. Seek industry outreach for software practices and law

  • Question 46:

    A company has a difficult time communicating between the security engineers, application developers, and sales staff. The sales staff tends to overpromise the application deliverables. The security engineers and application developers are falling behind schedule. Which of the following should be done to solve this?

    A. Allow the sales staff to shadow the developers and engineers to see how their sales impact the deliverables.

    B. Allow the security engineering team to do application development so they understand why it takes so long.

    C. Allow the application developers to attend a sales conference so they understand how business is done.

    D. Allow the sales staff to learn application programming and security engineering so they understand the whole lifecycle.

  • Question 47:

    Within an organization, there is a known lack of governance for solution designs. As a result there are inconsistencies and varying levels of quality for the artifacts that are produced. Which of the following will help BEST improve this situation?

    A. Ensure that those producing solution artifacts are reminded at the next team meeting that quality is important.

    B. Introduce a peer review process that is mandatory before a document can be officially made final.

    C. Introduce a peer review and presentation process that includes a review board with representation from relevant disciplines.

    D. Ensure that appropriate representation from each relevant discipline approves of the solution documents before official approval.

  • Question 48:

    A manager who was attending an all-day training session was overdue entering bonus and payroll information for subordinates. The manager felt the best way to get the changes entered while in training was to log into the payroll system, and then activate desktop sharing with a trusted subordinate. The manager granted the subordinate control of the desktop thereby giving the subordinate full access to the payroll system. The subordinate did not have authorization to be in the payroll system. Another employee reported the incident to the security team. Which of the following would be the MOST appropriate method for dealing with this issue going forward?

    A. Provide targeted security awareness training and impose termination for repeat violators.

    B. Block desktop sharing and web conferencing applications and enable use only with approval.

    C. Actively monitor the data traffic for each employee using desktop sharing or web conferencing applications.

    D. Permanently block desktop sharing and web conferencing applications and do not allow its use at the company.

  • Question 49:

    A trust relationship has been established between two organizations with web based services. One organization is acting as the Requesting Authority (RA) and the other acts as the Provisioning Service Provider (PSP). Which of the following is correct about the trust relationship?

    A. The trust relationship uses SAML in the SOAP header. The SOAP body transports the SPML requests / responses.

    B. The trust relationship uses XACML in the SAML header. The SAML body transports the SOAP requests / responses.

    C. The trust relationship uses SPML in the SOAP header. The SOAP body transports the SAML requests / responses.

    D. The trust relationship uses SPML in the SAML header. The SAML body transports the SPML requests / responses.

  • Question 50:

    A security services company is scoping a proposal with a client. They want to perform a general security audit of their environment within a two week period and consequently have the following requirements: Requirement 1 ?Ensure their server infrastructure operating systems are at their latest patch levels

    Requirement 2 ?Test the behavior between the application and database

    Requirement 3 ?Ensure that customer data cannot be exfiltrated

    Which of the following is the BEST solution to meet the above requirements?

    A. Penetration test, perform social engineering and run a vulnerability scanner

    B. Perform dynamic code analysis, penetration test and run a vulnerability scanner

    C. Conduct network analysis, dynamic code analysis, and static code analysis

    D. Run a protocol analyzer perform static code analysis and vulnerability assessment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.