Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Apr 04, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 211:

    Joe, an administrator, is notified that contract workers will be onsite assisting with a new project. Joe wants each worker to be aware of the corporate policy pertaining to USB storage devices. Which of the following should each worker review and understand before beginning work?

    A. Interconnection Security Agreement

    B. Memorandum of Understanding

    C. Business Partnership Agreement

    D. Non-Disclosure Agreement

  • Question 212:

    A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?

    A. Establish a risk matrix

    B. Inherit the risk for six months

    C. Provide a business justification to avoid the risk

    D. Provide a business justification for a risk exception

  • Question 213:

    Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to help the security administrator make an approximate determination of the operating system in use on the local company network? (Select THREE).

    A. Passive banner grabbing

    B. Password cracker

    C. http://www.company.org/documents_private/index.php?search=string#andtopic=windowsandtcp =packet%20captureandcookie=wokdjwalkjcnie61lkasdf2aliser4

    D. 443/tcp open http

    E. dig host.company.com

    F. 09:18:16.262743 IP (tos 0x0, ttl 64, id 9870, offset 0, flags [none], proto TCP (6), length 40) 192.168.1.3.1051 > 10.46.3.7.80: Flags [none], cksum 0x1800 (correct), win 512, length 0

    G. Nmap

  • Question 214:

    An organization determined that each of its remote sales representatives must use a smartphone for email access. The organization provides the same centrally manageable model to each person. Which of the following mechanisms BEST protects the confidentiality of the resident data?

    A. Require dual factor authentication when connecting to the organization's email server.

    B. Require each sales representative to establish a PIN to access the smartphone and limit email storage to two weeks.

    C. Require encrypted communications when connecting to the organization's email server.

    D. Require a PIN and automatic wiping of the smartphone if someone enters a specific number of incorrect PINs.

  • Question 215:

    After the install process, a software application executed an online activation process. After a few months, the system experienced a hardware failure. A backup image of the system was restored on a newer revision of the same brand and model device. After the restore, the specialized application no longer works. Which of the following is the MOST likely cause of the problem?

    A. The binary files used by the application have been modified by malware.

    B. The application is unable to perform remote attestation due to blocked ports.

    C. The restored image backup was encrypted with the wrong key.

    D. The hash key summary of hardware and installed software no longer match.

  • Question 216:

    An architect has been engaged to write the security viewpoint of a new initiative. Which of the following BEST describes a repeatable process that can be used for establishing the security architecture?

    A. Inspect a previous architectural document. Based on the historical decisions made, consult the architectural control and pattern library within the organization and select the controls that appear to best fit this new architectural need.

    B. Implement controls based on the system needs. Perform a risk analysis of the system. For any remaining risks, perform continuous monitoring.

    C. Classify information types used within the system into levels of confidentiality, integrity, and availability. Determine minimum required security controls. Conduct a risk analysis. Decide on which security controls to implement.

    D. Perform a risk analysis of the system. Avoid extreme risks. Mitigate high risks. Transfer medium risks and accept low risks. Perform continuous monitoring to ensure that the system remains at an adequate security posture.

  • Question 217:

    A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without external interaction from another user with elevated privileges. This requirement is BEST described as an implementation of:

    A. an administrative control

    B. dual control

    C. separation of duties

    D. least privilege

    E. collusion

  • Question 218:

    The Chief Executive Officer (CEO) has decided to outsource systems which are not core business functions; however, a recent review by Ann, the risk officer, has indicated that core business functions are dependent on the outsourced systems. Ann has requested that the IT department calculates the priority of restoration for all systems and applications under the new business model. Which of the following is the BEST tool to achieve this?

    A. Business impact analysis

    B. Annualized loss expectancy analysis

    C. TCO analysis

    D. Residual risk and gap analysis

  • Question 219:

    A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical records on their tablets. The doctors and specialists access patient records over the hospital's guest WiFi network which is isolated from the internal network with appropriate security controls. The patient records management system can be accessed from the guest network and require two factor authentication. Using a remote desktop type interface, the doctors and specialists can interact with the hospital's system. Cut and paste and printing functions are disabled to prevent the copying of data to BYOD devices. Which of the following are of MOST concern? (Select TWO).

    A. Privacy could be compromised as patient records can be viewed in uncontrolled areas.

    B. Device encryption has not been enabled and will result in a greater likelihood of data loss.

    C. The guest WiFi may be exploited allowing non-authorized individuals access to confidential patient data.

    D. Malware may be on BYOD devices which can extract data via key logging and screen scrapes.

    E. Remote wiping of devices should be enabled to ensure any lost device is rendered inoperable.

  • Question 220:

    A company receives an e-discovery request for the Chief Information Officer's (CIO's) email data. The storage administrator reports that the data retention policy relevant to their industry only requires one year of email data. However the storage administrator also reports that there are three years of email data on the server and five years of email data on backup tapes. How many years of data MUST the company legally provide?

    A. 1

    B. 2

    C. 3

    D. 5

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.