Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Mar 27, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 231:

    The DLP solution has been showing some unidentified encrypted data being sent using FTP to a remote server. A vulnerability scan found a collection of Linux servers that are missing OS level patches. Upon further investigation, a technician notices that there are a few unidentified processes running on a number of the servers. What would be a key FIRST step for the data security team to undertake at this point?

    A. Capture process ID data and submit to anti-virus vendor for review.

    B. Reboot the Linux servers, check running processes, and install needed patches.

    C. Remove a single Linux server from production and place in quarantine.

    D. Notify upper management of a security breach.

    E. Conduct a bit level image, including RAM, of one or more of the Linux servers.

  • Question 232:

    Customers are receiving emails containing a link to malicious software. These emails are subverting spam filters. The email reads as follows:

    Delivered-To: [email protected]

    Received: by 10.14.120.205

    Mon, 1 Nov 2010 11:15:24 -0700 (PDT)

    Received: by 10.231.31.193

    Mon, 01 Nov 2010 11:15:23 -0700 (PDT)

    Return-Path:

    Received: from 127.0.0.1 for ; Mon, 1 Nov 2010 13:15:14 -0500 (envelope-from )

    Received: by smtpex.example.com (SMTP READY)

    with ESMTP (AIO); Mon, 01 Nov 2010 13:15:14 -0500

    Received: from 172.18.45.122 by 192.168.2.55; Mon, 1 Nov 2010 13:15:14 -0500

    From: Company

    To: "[email protected]"

    Date: Mon, 1 Nov 2010 13:15:11 -0500

    Subject: New Insurance Application

    Thread-Topic: New Insurance Application

    Please download and install software from the site below to maintain full access to your account.

    www.examplesite.com

    Additional information: The authorized mail servers IPs are 192.168.2.10 and 192.168.2.11.

    The network's subnet is 192.168.2.0/25.

    Which of the following are the MOST appropriate courses of action a security administrator could take to eliminate this risk? (Select TWO).

    A. Identify the origination point for malicious activity on the unauthorized mail server.

    B. Block port 25 on the firewall for all unauthorized mail servers.

    C. Disable open relay functionality.

    D. Shut down the SMTP service on the unauthorized mail server.

    E. Enable STARTTLS on the spam filter.

  • Question 233:

    An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials?

    A. Ensure the SaaS provider supports dual factor authentication.

    B. Ensure the SaaS provider supports encrypted password transmission and storage.

    C. Ensure the SaaS provider supports secure hash file exchange.

    D. Ensure the SaaS provider supports role-based access control.

    E. Ensure the SaaS provider supports directory services federation.

  • Question 234:

    Wireless users are reporting issues with the company's video conferencing and VoIP systems. The security administrator notices internal DoS attacks from infected PCs on the network causing the VoIP system to drop calls. The security administrator also notices that the SIP servers are unavailable during these attacks. Which of the following security controls will MOST likely mitigate the VoIP DoS attacks on the network? (Select TWO).

    A. Install a HIPS on the SIP servers

    B. Configure 802.1X on the network

    C. Update the corporate firewall to block attacking addresses

    D. Configure 802.11e on the network

    E. Configure 802.1q on the network

  • Question 235:

    A critical system audit shows that the payroll system is not meeting security policy due to missing OS security patches. Upon further review, it appears that the system is not being patched at all. The vendor states that the system is only supported on the current OS patch level. Which of the following compensating controls should be used to mitigate the vulnerability of missing OS patches on this system?

    A. Isolate the system on a secure network to limit its contact with other systems

    B. Implement an application layer firewall to protect the payroll system interface

    C. Monitor the system's security log for unauthorized access to the payroll application

    D. Perform reconciliation of all payroll transactions on a daily basis

  • Question 236:

    A security administrator has been asked to select a cryptographic algorithm to meet the criteria of a new application. The application utilizes streaming video that can be viewed both on computers and mobile devices. The application designers have asked that the algorithm support the transport encryption with the lowest possible performance overhead. Which of the following recommendations would BEST meet the needs of the application designers? (Select TWO).

    A. Use AES in Electronic Codebook mode

    B. Use RC4 in Cipher Block Chaining mode

    C. Use RC4 with Fixed IV generation

    D. Use AES with cipher text padding

    E. Use RC4 with a nonce generated IV

    F. Use AES in Counter mode

  • Question 237:

    An administrator has four virtual guests on a host server. Two of the servers are corporate SQL servers, one is a corporate mail server, and one is a testing web server for a small group of developers. The administrator is experiencing difficulty connecting to the host server during peak network usage times. Which of the following would allow the administrator to securely connect to and manage the host server during peak usage times?

    A. Increase the virtual RAM allocation to high I/O servers.

    B. Install a management NIC and dedicated virtual switch.

    C. Configure the high I/O virtual servers to use FCoE rather than iSCSI.

    D. Move the guest web server to another dedicated host.

  • Question 238:

    A storage as a service company implements both encryption at rest as well as encryption in transit of customers' data. The security administrator is concerned with the overall security of the encrypted customer data stored by the company servers and wants the development team to implement a solution that will strengthen the customer's encryption key. Which of the following, if implemented, will MOST increase the time an offline password attack against the customers' data would take?

    A. key = NULL ; for (int i=0; i<5000; i++) { key = sha(key + password) }

    B. password = NULL ; for (int i=0; i<10000; i++) { password = sha256(key) }

    C. password = password + sha(password+salt) + aes256(password+salt)

    D. key = aes128(sha256(password), password))

  • Question 239:

    A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of the following actions would protect the external network interfaces from external attackers performing network scanning?

    A. Remove contact details from the domain name registrar to prevent social engineering attacks.

    B. Test external interfaces to see how they function when they process fragmented IP packets.

    C. Enable a honeynet to capture and facilitate future analysis of malicious attack vectors.

    D. Filter all internal ICMP message traffic, forcing attackers to use full-blown TCP port scans against external network interfaces.

  • Question 240:

    A popular commercial virtualization platform allows for the creation of virtual hardware. To virtual machines, this virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?

    A. Software-based root of trust

    B. Continuous chain of trust

    C. Chain of trust with a hardware root of trust

    D. Software-based trust anchor with no root of trust

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.