Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Apr 12, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 181:

    The sales division within a large organization purchased touch screen tablet computers for all 250 sales representatives in an effort to showcase the use of technology to its customers and increase productivity. This includes the development of a new product tracking application that works with the new platform. The security manager attempted to stop the deployment because the equipment and application are non-standard and unsupported within the organization. However, upper management decided to continue the deployment. Which of the following provides the BEST method for evaluating the potential threats?

    A. Conduct a vulnerability assessment to determine the security posture of the new devices and the application.

    B. Benchmark other organizations that already encountered this type of situation and apply all relevant learnings and industry best practices.

    C. Work with the business to understand and classify the risk associated with the full lifecycle of the hardware and software deployment.

    D. Develop a standard image for the new devices and migrate to a web application to eliminate locally resident data.

  • Question 182:

    A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user's ongoing communication be retained in the user's account for future investigations. Which of the following will BEST meet the goals of law enforcement?

    A. Begin a chain-of-custody on for the user's communication. Next, place a legal hold on the user's email account.

    B. Perform an e-discover using the applicable search terms. Next, back up the user's email for a future investigation.

    C. Place a legal hold on the user's email account. Next, perform e-discovery searches to collect applicable emails.

    D. Perform a back up of the user's email account. Next, export the applicable emails that match the search terms.

  • Question 183:

    An insurance company is looking to purchase a smaller company in another country. Which of the following tasks would the security administrator perform as part of the security due diligence?

    A. Review switch and router configurations

    B. Review the security policies and standards

    C. Perform a network penetration test

    D. Review the firewall rule set and IPS logs

  • Question 184:

    The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants to connect it to the company's internal network. The Chief Information Security Officer (CISO) was told to research and recommend how to secure this device. Which of the following recommendations should be implemented to keep the device from posing a security risk to the company?

    A. A corporate policy to prevent sensitive information from residing on a mobile device and anti-virus software.

    B. Encryption of the non-volatile memory and a corporate policy to prevent sensitive information from residing on a mobile device.

    C. Encryption of the non-volatile memory and a password or PIN to access the device.

    D. A password or PIN to access the device and a corporate policy to prevent sensitive information from residing on a mobile device.

  • Question 185:

    It has come to the IT administrator's attention that the "post your comment" field on the company blog page has been exploited, resulting in cross-site scripting attacks against customers reading the blog. Which of the following would be the MOST effective at preventing the "post your comment" field from being exploited?

    A. Update the blog page to HTTPS

    B. Filter metacharacters

    C. Install HIDS on the server

    D. Patch the web application

    E. Perform client side input validation

  • Question 186:

    A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management?

    A. Subjective and based on an individual's experience.

    B. Requires a high degree of upfront work to gather environment details.

    C. Difficult to differentiate between high, medium, and low risks.

    D. Allows for cost and benefit analysis.

    E. Calculations can be extremely complex to manage.

  • Question 187:

    An assessor identifies automated methods for identifying security control compliance through validating sensors at the endpoint and at Tier 2. Which of the following practices satisfy continuous monitoring of authorized information systems?

    A. Independent verification and validation

    B. Security test and evaluation

    C. Risk assessment

    D. Ongoing authorization

  • Question 188:

    An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following patterns were detected:

    Pattern 1 ?Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated.

    Pattern 2 ?For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out.

    Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO).

    A. Apply a hidden field that triggers a SIEM alert

    B. Cross site scripting attack

    C. Resource exhaustion attack

    D. Input a blacklist of all known BOT malware IPs into the firewall

    E. SQL injection

    F. Implement an inline WAF and integrate into SIEM

    G. Distributed denial of service

    H. Implement firewall rules to block the attacking IP addresses

  • Question 189:

    A health service provider is considering the impact of allowing doctors and nurses access to the internal email system from their personal smartphones. The Information Security Officer (ISO) has received a technical document from the security administrator explaining that the current email system is capable of enforcing security policies to personal smartphones, including screen lockout and mandatory PINs. Additionally, the system is able to remotely wipe a phone if reported lost or stolen. Which of the following should the Information Security Officer be MOST concerned with based on this scenario? (Select THREE).

    A. The email system may become unavailable due to overload.

    B. Compliance may not be supported by all smartphones.

    C. Equipment loss, theft, and data leakage.

    D. Smartphone radios can interfere with health equipment.

    E. Data usage cost could significantly increase.

    F. Not all smartphones natively support encryption.

    G. Smartphones may be used as rogue access points.

  • Question 190:

    A security manager for a service provider has approved two vendors for connections to the service provider backbone. One vendor will be providing authentication services for its payment card service, and the other vendor will be providing maintenance to the service provider infrastructure sites. Which of the following business agreements is MOST relevant to the vendors and service provider's relationship?

    A. Memorandum of Agreement

    B. Interconnection Security Agreement

    C. Non-Disclosure Agreement

    D. Operating Level Agreement

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.