Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Mar 27, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 271:

    A security tester is testing a website and performs the following manual query:

    https://www.comptia.com/cookies.jsp?products=5%20and%201=1

    The following response is received in the payload:

    "ORA-000001: SQL command not properly ended"

    Which of the following is the response an example of?

    A. Fingerprinting

    B. Cross-site scripting

    C. SQL injection

    D. Privilege escalation

  • Question 272:

    A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO).

    A. A full-system backup should be implemented to a third-party provider with strong encryption for data in transit.

    B. A DLP gateway should be installed at the company border.

    C. Strong authentication should be implemented via external biometric devices.

    D. Full-tunnel VPN should be required for all network communication.

    E. Full-drive file hashing should be implemented with hashes stored on separate storage.

    F. Split-tunnel VPN should be enforced when transferring sensitive data.

  • Question 273:

    An educational institution would like to make computer labs available to remote students. The labs are used for various IT networking, security, and programming courses. The requirements are:

    Each lab must be on a separate network segment.

    Labs must have access to the Internet, but not other lab networks. Student devices must have network access, not simple access to hosts on the lab networks.

    Students must have a private certificate installed before gaining access.

    Servers must have a private certificate installed locally to provide assurance to the students.

    All students must use the same VPN connection profile.

    Which of the following components should be used to achieve the design in conjunction with directory services?

    A. L2TP VPN over TLS for remote connectivity, SAML for federated authentication, firewalls between each lab segment

    B. SSL VPN for remote connectivity, directory services groups for each lab group, ACLs on routing equipment

    C. IPSec VPN with mutual authentication for remote connectivity, RADIUS for authentication, ACLs on network equipment

    D. Cloud service remote access tool for remote connectivity, OAuth for authentication, ACL on routing equipment

  • Question 274:

    A network engineer wants to deploy user-based authentication across the company's wired and wireless infrastructure at layer 2 of the OSI model. Company policies require that users be centrally managed and authenticated and that each user's network access be controlled based on the user's role within the company. Additionally, the central authentication system must support hierarchical trust and the ability to natively authenticate mobile devices and workstations. Which of the following are needed to implement these requirements? (Select TWO).

    A. SAML

    B. WAYF

    C. LDAP

    D. RADIUS

    E. Shibboleth

    F. PKI

  • Question 275:

    An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?

    A. BGP route hijacking attacks

    B. Bogon IP network traffic

    C. IP spoofing attacks

    D. Man-in-the-middle attacks

    E. Amplified DDoS attacks

  • Question 276:

    Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim's privilege level. The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue?

    A. Integer overflow

    B. Click-jacking

    C. Race condition

    D. SQL injection

    E. Use after free

    F. Input validation

  • Question 277:

    A security administrator notices the following line in a server's security log:

    ') + "';

    The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the security administrator implement to prevent this particular attack?

    A. WAF

    B. Input validation

    C. SIEM

    D. Sandboxing

    E. DAM

  • Question 278:

    A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).

    A. The X509 V3 certificate was issued by a non trusted public CA.

    B. The client-server handshake could not negotiate strong ciphers.

    C. The client-server handshake is configured with a wrong priority.

    D. The client-server handshake is based on TLS authentication.

    E. The X509 V3 certificate is expired.

    F. The client-server implements client-server mutual authentication with different certificates.

  • Question 279:

    ABC Corporation uses multiple security zones to protect systems and information, and all of the VM hosts are part of a consolidated VM infrastructure. Each zone has different VM administrators. Which of the following restricts different zone administrators from directly accessing the console of a VM host from another zone?

    A. Ensure hypervisor layer firewalling between all VM hosts regardless of security zone.

    B. Maintain a separate virtual switch for each security zone and ensure VM hosts bind to only the correct virtual NIC(s).

    C. Organize VM hosts into containers based on security zone and restrict access using an ACL.

    D. Require multi-factor authentication when accessing the console at the physical VM host.

  • Question 280:

    Which of the following describes a risk and mitigation associated with cloud data storage?

    A. Risk: Shared hardware caused data leakage Mitigation: Strong encryption at rest

    B. Risk: Offsite replication Mitigation: Multi-site backups

    C. Risk: Data loss from de-duplication Mitigation: Dynamic host bus addressing

    D. Risk: Combined data archiving Mitigation: Two-factor administrator authentication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.