Exam Details

  • Exam Code
    :RC0-C02
  • Exam Name
    :CompTIA Advanced Security Practitioner (CASP) Recertification Exam for Continuing Education
  • Certification
    :CompTIA Advanced Security Practitioner
  • Vendor
    :CompTIA
  • Total Questions
    :308 Q&As
  • Last Updated
    :Mar 27, 2025

CompTIA CompTIA Advanced Security Practitioner RC0-C02 Questions & Answers

  • Question 61:

    An IT auditor is reviewing the data classification for a sensitive system. The company has classified the data stored in the sensitive system according to the following matrix: DATA TYPECONFIDENTIALITYINTEGRITYAVAILABILITY

    FinancialHIGHHIGHLOW Client nameMEDIUMMEDIUMHIGH Client addressLOWMEDIUMLOW

    AGGREGATEMEDIUMMEDIUMMEDIUM

    The auditor is advising the company to review the aggregate score and submit it to senior management. Which of the following should be the revised aggregate score?

    A. HIGH, MEDIUM, LOW

    B. MEDIUM, MEDIUM, LOW

    C. HIGH, HIGH, HIGH

    D. MEDIUM, MEDIUM, MEDIUM

  • Question 62:

    A project manager working for a large city government is required to plan and build a WAN, which will be required to host official business and public access. It is also anticipated that the city's emergency and first response communication systems will be required to operate across the same network. The project manager has experience with enterprise IT projects, but feels this project has an increased complexity as a result of the mixed business / public use and the critical infrastructure it will provide. Which of the following should the project manager release to the public, academia, and private industry to ensure the city provides due care in considering all project factors prior to building its new WAN?

    A. NDA

    B. RFI

    C. RFP

    D. RFQ

  • Question 63:

    The Linux server at Company A hosts a graphical application widely used by the company designers. One designer regularly connects to the server from a Mac laptop in the designer's office down the hall. When the security engineer learns of this it is discovered the connection is not secured and the password can easily be obtained via network sniffing. Which of the following would the security engineer MOST likely implement to secure this connection? Linux Server: 192.168.10.10/24 Mac Laptop: 192.168.10.200/24

    A. From the server, establish an SSH tunnel to the Mac and VPN to 192.168.10.200.

    B. From the Mac, establish a remote desktop connection to 192.168.10.10 using Network Layer Authentication and the CredSSP security provider.

    C. From the Mac, establish a VPN to the Linux server and connect the VNC to 127.0.0.1.

    D. From the Mac, establish a SSH tunnel to the Linux server and connect the VNC to 127.0.0.1.

  • Question 64:

    Statement: "The system shall implement measures to notify system administrators prior to a security incident occurring." Which of the following BEST restates the above statement to allow it to be implemented by a team of software developers?

    A. The system shall cease processing data when certain configurable events occur.

    B. The system shall continue processing in the event of an error and email the security administrator the error logs.

    C. The system shall halt on error.

    D. The system shall throw an error when specified incidents pass a configurable threshold.

  • Question 65:

    A Security Manager is part of a team selecting web conferencing systems for internal use. The system will only be used for internal employee collaboration. Which of the following are the MAIN concerns of the security manager? (Select THREE).

    A. Security of data storage

    B. The cost of the solution

    C. System availability

    D. User authentication strategy

    E. PBX integration of the service

    F. Operating system compatibility

  • Question 66:

    An intruder was recently discovered inside the data center, a highly sensitive area. To gain access, the intruder circumvented numerous layers of physical and electronic security measures. Company leadership has asked for a thorough review of physical security controls to prevent this from happening again. Which of the following departments are the MOST heavily invested in rectifying the problem? (Select THREE).

    A. Facilities management

    B. Human resources

    C. Research and development

    D. Programming

    E. Data center operations

    F. Marketing

    G. Information technology

  • Question 67:

    A web developer is responsible for a simple web application that books holiday accommodations. The front-facing web server offers an HTML form, which asks for a user's age. This input gets placed into a signed integer variable and is then checked to ensure that the user is in the adult age range.

    Users have reported that the website is not functioning correctly. The web developer has inspected log files and sees that a very large number (in the billions) was submitted just before the issue started occurring. Which of the following is the MOST likely situation that has occurred?

    A. The age variable stored the large number and filled up disk space which stopped the application from continuing to function. Improper error handling prevented the application from recovering.

    B. The age variable has had an integer overflow and was assigned a very small negative number which led to unpredictable application behavior. Improper error handling prevented the application from recovering.

    C. Computers are able to store numbers well above "billions" in size. Therefore, the website issues are not related to the large number being input.

    D. The application has crashed because a very large integer has led to a "divide by zero". Improper error handling prevented the application from recovering.

  • Question 68:

    A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now?

    A. Agile

    B. Waterfall

    C. Scrum

    D. Spiral

  • Question 69:

    A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year and wants to plan security into the application deployment. The board is primarily concerned with the applications' compliance with federal assessment and authorization standards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend subsequent configuration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system authorization has the security engineer omitted?

    A. Establish the security control baseline

    B. Build the application according to software development security standards

    C. Review the results of user acceptance testing

    D. Consult with the stakeholders to determine which standards can be omitted

  • Question 70:

    ODBC access to a database on a network-connected host is required. The host does not have a security mechanism to authenticate the incoming ODBC connection, and the application requires that the connection have read/write permissions. In order to further secure the data, a nonstandard configuration would need to be implemented. The information in the database is not sensitive, but was not readily accessible prior to the implementation of the ODBC connection. Which of the following actions should be taken by the security analyst?

    A. Accept the risk in order to keep the system within the company's standard security configuration.

    B. Explain the risks to the data owner and aid in the decision to accept the risk versus choosing a nonstandard solution.

    C. Secure the data despite the need to use a security control or solution that is not within company standards.

    D. Do not allow the connection to be made to avoid unnecessary risk and avoid deviating from the standard security configuration.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-C02 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.