Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Mar 27, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 281:

    A company decides to purchase commercially available software packages. This can introduce new security risks to the network. Which of the following is the BEST description of why this is true?

    A. Commercially available software packages are typically well known and widely available. Information concerning vulnerabilities and viable attack patterns are never revealed by the developer to avoid lawsuits.

    B. Commercially available software packages are often widely available. Information concerning vulnerabilities is often kept internal to the company that developed the software.

    C. Commercially available software packages are not widespread and are only available in limited areas. Information concerning vulnerabilities is often ignored by business managers.

    D. Commercially available software packages are well known and widely available. Information concerning vulnerabilities and viable attack patterns are always shared within the IT community.

  • Question 282:

    Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).

    A. Jailbroken mobile device

    B. Reconnaissance tools

    C. Network enumerator

    D. HTTP interceptor

    E. Vulnerability scanner

    F. Password cracker

  • Question 283:

    A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administrator recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues?

    A. A separate physical interface placed on a private VLAN should be configured for live host operations.

    B. Database record encryption should be used when storing sensitive information on virtual servers.

    C. Full disk encryption should be enabled across the enterprise to ensure the confidentiality of sensitive data.

    D. Sensitive data should be stored on a backend SAN which uses an isolated fiber channel network.

  • Question 284:

    The organization has an IT driver on cloud computing to improve delivery times for IT solution provisioning. Separate to this initiative, a business case has been approved for replacing the existing banking platform for credit card processing with a newer offering. It is the security practitioner's responsibility to evaluate whether the new credit card processing platform can be hosted within a cloud environment. Which of the following BEST balances the security risk and IT drivers for cloud computing?

    A. A third-party cloud computing platform makes sense for new IT solutions. This should be endorsed going forward so as to align with the IT strategy. However, the security practitioner will need to ensure that the third-party cloud provider does regular penetration tests to ensure that all data is secure.

    B. Using a third-party cloud computing environment should be endorsed going forward. This aligns with the organization's strategic direction. It also helps to shift any risk and regulatory compliance concerns away from the company's internal IT department. The next step will be to evaluate each of the cloud computing vendors, so that a vendor can then be selected for hosting the new credit card processing platform.

    C. There may be regulatory restrictions with credit cards being processed out of country or processed by shared hosting providers. A private cloud within the company should be considered. An options paper should be created which outlines the risks, advantages, disadvantages of relevant choices and it should recommended a way forward.

    D. Cloud computing should rarely be considered an option for any processes that need to be significantly secured. The security practitioner needs to convince the stakeholders that the new platform can only be delivered internally on physical infrastructure.

  • Question 285:

    Company ABC's SAN is nearing capacity, and will cause costly downtimes if servers run out disk space. Which of the following is a more cost effective alternative to buying a new SAN?

    A. Enable multipath to increase availability

    B. Enable deduplication on the storage pools

    C. Implement snapshots to reduce virtual disk size

    D. Implement replication to offsite datacenter

  • Question 286:

    A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

    A. Client side input validation

    B. Stored procedure

    C. Encrypting credit card details

    D. Regular expression matching

  • Question 287:

    An administrator is tasked with securing several website domains on a web server. The administrator elects to secure www.example.com, mail.example.org, archive.example.com, and www.example.org with the same certificate. Which of the following would allow the administrator to secure those domains with a single issued certificate?

    A. Intermediate Root Certificate

    B. Wildcard Certificate

    C. EV x509 Certificate

    D. Subject Alternative Names Certificate

  • Question 288:

    A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?

    A. Insecure direct object references, CSRF, Smurf

    B. Privilege escalation, Application DoS, Buffer overflow

    C. SQL injection, Resource exhaustion, Privilege escalation

    D. CSRF, Fault injection, Memory leaks

  • Question 289:

    Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the following HTTP request:

    POST /login.aspx HTTP/1.1

    Host: comptia.org

    Content-type: text/html

    txtUsername=annandtxtPassword=annandalreadyLoggedIn=falseandsubmit=true

    Which of the following should Ann perform to test whether the website is susceptible to a simple authentication bypass?

    A. Remove all of the post data and change the request to /login.aspx from POST to GET

    B. Attempt to brute force all usernames and passwords using a password cracker

    C. Remove the txtPassword post data and change alreadyLoggedIn from false to true

    D. Remove the txtUsername and txtPassword post data and toggle submit from true to false

  • Question 290:

    A security administrator is shown the following log excerpt from a Unix system:

    2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51.100.23 port 37914 ssh2

    2013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51.100.23 port 37915 ssh2

    2013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51.100.23 port 37916 ssh2

    2013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51.100.23 port 37918 ssh2

    2013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51.100.23 port 37920 ssh2

    2013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51.100.23 port 37924 ssh2

    Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).

    A. An authorized administrator has logged into the root account remotely.

    B. The administrator should disable remote root logins.

    C. Isolate the system immediately and begin forensic analysis on the host.

    D. A remote attacker has compromised the root account using a buffer overflow in sshd.

    E. A remote attacker has guessed the root password using a dictionary attack.

    F. Use iptables to immediately DROP connections from the IP 198.51.100.23.

    G. A remote attacker has compromised the private key of the root account.

    H. Change the root password immediately to a password not found in a dictionary.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.