Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Mar 27, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 251:

    An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?

    A. Implementing federated network access with the third party.

    B. Using a HSM at the network perimeter to handle network device access.

    C. Using a VPN concentrator which supports dual factor via hardware tokens.

    D. Implementing 802.1x with EAP-TTLS across the infrastructure.

  • Question 252:

    ABC Company must achieve compliance for PCI and SOX. Which of the following would BEST allow the organization to achieve compliance and ensure security? (Select THREE).

    A. Establish a list of users that must work with each regulation

    B. Establish a list of devices that must meet each regulation

    C. Centralize management of all devices on the network

    D. Compartmentalize the network

    E. Establish a company framework

    F. Apply technical controls to meet compliance with the regulation

  • Question 253:

    An administrator has four virtual guests on a host server. Two of the servers are corporate SQL servers, one is a corporate mail server, and one is a testing web server for a small group of developers. The administrator is experiencing difficulty connecting to the host server during peak network usage times. Which of the following would allow the administrator to securely connect to and manage the host server during peak usage times?

    A. Increase the virtual RAM allocation to high I/O servers.

    B. Install a management NIC and dedicated virtual switch.

    C. Configure the high I/O virtual servers to use FCoE rather than iSCSI.

    D. Move the guest web server to another dedicated host.

  • Question 254:

    A company runs large computing jobs only during the overnight hours. To minimize the amount of capital investment in equipment, the company relies on the elastic computing services of a major cloud computing vendor. Because the virtual resources are created and destroyed on the fly across a large pool of shared resources, the company never knows which specific hardware platforms will be used from night to night. Which of the following presents the MOST risk to confidentiality in this scenario?

    A. Loss of physical control of the servers

    B. Distribution of the job to multiple data centers

    C. Network transmission of cryptographic keys

    D. Data scraped from the hardware platforms

  • Question 255:

    Company XYZ finds itself using more cloud-based business tools, and password management is becoming onerous. Security is important to the company; as a result, password replication and shared accounts are not acceptable. Which of the following implementations addresses the distributed login with centralized authentication and has wide compatibility among SaaS vendors?

    A. Establish a cloud-based authentication service that supports SAML.

    B. Implement a new Diameter authentication server with read-only attestation.

    C. Install a read-only Active Directory server in the corporate DMZ for federation.

    D. Allow external connections to the existing corporate RADIUS server.

  • Question 256:

    A bank is in the process of developing a new mobile application. The mobile client renders content and communicates back to the company servers via REST/JSON calls. The bank wants to ensure that the communication is stateless between the mobile application and the web services gateway. Which of the following controls MUST be implemented to enable stateless communication?

    A. Generate a one-time key as part of the device registration process.

    B. Require SSL between the mobile application and the web services gateway.

    C. The jsession cookie should be stored securely after authentication.

    D. Authentication assertion should be stored securely on the client.

  • Question 257:

    An administrator has enabled salting for users' passwords on a UNIX box. A penetration tester must attempt to retrieve password hashes. Which of the following files must the penetration tester use to eventually obtain passwords on the system? (Select TWO).

    A. /etc/passwd

    B. /etc/shadow

    C. /etc/security

    D. /etc/password

    E. /sbin/logon

    F. /bin/bash

  • Question 258:

    The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Which of the following issues may potentially occur?

    A. The data may not be in a usable format.

    B. The new storage array is not FCoE based.

    C. The data may need a file system check.

    D. The new storage array also only has a single controller.

  • Question 259:

    A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition and logical volume. Which of the following is the BEST way to ensure confidentiality of individual operating system data?

    A. Encryption of each individual partition

    B. Encryption of the SSD at the file level

    C. FDE of each logical volume on the SSD

    D. FDE of the entire SSD as a single disk

  • Question 260:

    An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?

    A. Access control lists

    B. SELinux

    C. IPtables firewall

    D. HIPS

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.