CompTIA PenTest+ Practice Test (PT0-002)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-002 Information
CompTIA PenTest+ (PT0-002) Exam
The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.
Exam Overview
The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.
Exam Content
The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.
Who Should Take This Exam?
The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.
How to Prepare
Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.
Summary
The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.
Scroll down to see your responses and detailed results
Free CompTIA PenTest+ PT0-002 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Planning and ScopingInformation Gathering and Vulnerability ScanningAttacks and ExploitsReporting and CommunicationTools and Code Analysis
During the planning phase of a penetration test, which of the following elements would be MOST important to include in the Statement of Work to ensure that the penetration tester and the client have a common understanding of the tasks and goals?
Drafting a detailed checklist of potential vulnerabilities to investigate
Comprehensive report including executive summary and technical findings
Defined goals and objectives of the penetration test
Commercial penetration testing tools to be exclusively utilized
Answer Description
The answer is 'Defined goals and objectives of the penetration test' because a clear agreement on the goals and objectives is essential for any Statement of Work. It provides a clear understanding of what the penetration test is intended to achieve, which guides the entire engagement. Other options like the types of tools and methodologies to be used or the detailed report based on findings are subsequent considerations that are aligned with the primary goals and objectives but do not replace their primacy in planning.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are goals and objectives so crucial for a penetration test?
What should be included when defining goals and objectives in the Statement of Work?
How does the Statement of Work impact the overall penetration testing process?
During a penetration test, you are tasked with crafting a phishing campaign to test the organization's resilience to social engineering efforts. Using the Social Engineering Toolkit, which of the following would be the BEST approach to emulate a realistic spear-phishing attack?
Clone a known trusted site and slightly modify it to collect user credentials.
Replicate an exact copy of their public website to confuse employees.
Modify the organization's public website to redirect to your malicious site.
Send out generic business-related documents that contain no organization-specific information.
Answer Description
The correct answer is to clone a known trusted site and slightly modify it (e.g., a login page of their webmail) to collect user credentials. This approach is considered the most effective because it presents a familiar interface to the target, thereby increasing the likelihood of the phishing attack being successful. In contrast, replicating an exact copy of a website may raise red flags if the URL or security certificates don't match, while modifying a company's public website or sending unrelated documents might not be as convincing or relevant to the targeted individual.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is spear-phishing and how is it different from regular phishing?
What is the Social Engineering Toolkit (SET) and how can it be used in penetration testing?
Why is it important to clone a trusted site rather than create a completely different one for phishing?
During a brute force attack against an online service, the penetration tester is able to try 1000 passwords per second without any restrictions from the application. This scenario indicates that the application is not equipped with proper account lockout mechanisms.
False
True
Answer Description
The correct answer is 'True' because in a secure online application, after a certain number of failed login attempts, account lockout mechanisms should be triggered to prevent further attempts, slowing down or halting brute force attacks. The scenario suggests that the absence of such security controls allows the penetration tester to attempt a large volume of passwords in a short period.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are account lockout mechanisms?
Why is brute force a security concern for online applications?
How can an application improve security against brute force attacks?
Tokens issued by a server during a session can be scoped strictly enough to prevent interception and reuse by an unauthorized party.
False
True
Answer Description
Tokens, also known as session tokens, are susceptible to different types of attacks if not secured properly. Although tokens can be scoped, if token handling mechanisms are not implemented with strong security controls, such as proper encryption and validation measures, they can still be intercepted and misused by attackers. The correct answer reflects the understanding that without adequate security controls, even well-scoped tokens can be vulnerable to interception and unauthorized reuse.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the types of attacks that can target session tokens?
What security controls can be implemented to protect session tokens?
What is meant by 'scoping' a session token?
During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?
Installing a rootkit to conceal the presence of your tools and activities
Disabling all logging services on the target system
Hosting all backdoor connections on non-standard ports to avoid attention
Renaming all penetration testing tools with system default process names
Frequently changing file and directory permissions to maintain access
Cleaning all log files daily to remove any trace of unauthorized access
Answer Description
The use of a rootkit is a sophisticated method for maintaining access while avoiding detection since it can intercept and alter system calls and manipulate the normal behavior of the operating system to hide the presence of processes, files, network connections, and logs associated with the penetration tester's activities. The complexity and stealthiness of rootkits make them particularly effective at evading detection from system monitoring tools. Cleaning log files might remove evidence of initial access, but it's a detectable action and can alert administrators due to missing logs. Disabling logging could raise immediate suspicion when log files stop updating. Using non-standard ports could help to hide network traffic but does not cover tracks on the host system itself. Renaming tools with inconspicuous names does little to prevent detection from system or network monitoring, and frequent permission changes can be suspicious and are likely to be scrutinized.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are rootkits and how do they work?
What are the risks associated with using rootkits?
How can system administrators detect rootkits?
During an active reconnaissance phase, a penetration tester wants to monitor and capture the interaction between a client application and its server via API calls. What tool or technique would be the best choice to accomplish this task?
Port scanner
Anti-virus software
Web proxy
Wardriving tools
Answer Description
Using a web proxy is the correct answer because it acts as an intermediary for requests from clients seeking resources from servers. When a client makes an API request, it goes through the proxy, which allows the tester to examine and capture the request and response data. This is critical when analyzing how client and server communicate and identifying potential security issues within the API calls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a web proxy and how does it work?
How do penetration testers use web proxies to identify security issues?
What are some popular web proxy tools used in penetration testing?
When referring to security threats, what is the primary characteristic of the activity where unsolicited messages are sent in bulk to numerous recipients?
Spoofing
Spamming
Brute force attacks
Phishing
Answer Description
Spamming is characterized by the mass distribution of unsolicited messages. These messages might be commercials, scams, or harmful links and can be delivered via email, messaging platforms, social media, or other communication tools. They are typically sent in bulk to a large number of recipients. While 'Phishing' is also an unsolicited communication, it is specifically crafted to trick individuals into divulging personal information and is not necessarily done in bulk. 'Spoofing' involves impersonating another device or user on a network to bypass security measures or gain unauthorized access, which does not inherently involve mass messaging. 'Brute force attacks' refer to the trial-and-error method used to decode encrypted data or credentials, not the sending of messages.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What do you mean by unsolicited messages?
How do spammers collect email addresses for spamming?
What are the potential risks of receiving spam emails?
As a penetration tester, you are contracted to perform a security assessment for a company that utilizes multiple public cloud services. Which of the following considerations is MOST important when defining the scope of your penetration test?
Secure the written permission to attack from local government authorities.
Select the tools that will be used during the engagement.
Ensure the cloud service provider's policy for penetration testing is followed.
Determine if other organizations hosted by the same provider inadvertently come into scope.
Answer Description
Understanding and adhering to the cloud service provider's policy is most important because it dictates what actions can and cannot be taken within the provider's environment. Conducting activities beyond allowed limits may result in account suspension or legal consequences. While knowing the tools to be used and assessing if the organization inadvertently comes into scope are also important, they follow the guidelines outlined by the providers' policies for testing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cloud service provider's policy for penetration testing?
Why is it important to secure written permission for penetration testing?
What does it mean for an organization to inadvertently come into scope during a penetration test?
In the context of network security, what is the primary purpose of using a tool that employs the technique known as 'sniffing'?
Injecting traffic into the network
Monitoring and capturing network traffic
Decrypting SSL/TLS traffic
Broadcasting service set identifiers (SSIDs)
Answer Description
The correct answer is Monitoring and capturing network traffic. Sniffing is a technique that involves monitoring the network traffic flowing through a network, which can include capturing data packets to analyze their content for information gathering purposes. This is a key process during a penetration test to understand the network and identify potential vulnerabilities or data leakage. Decrypting SSL/TLS traffic is not the primary purpose, it's a separate process that can sometimes be associated with captured traffic if appropriate keys are available. Injecting traffic into the network relates to actions typically performed during active attacks or specific testing procedures, not passive information gathering like sniffing. Broadcasting service set identifiers (SSIDs) is part of wireless network operations, not a function of network sniffing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the common tools used for network sniffing?
How does sniffing differ from other network techniques like spoofing?
What kind of information can be gathered through sniffing?
Which type of control would include establishing a policy that mandates regular security awareness training for all employees?
Operational control
Administrative control
Physical control
Technical control
Answer Description
Establishing a policy that mandates regular security awareness training for all employees is an example of an administrative control. Administrative controls consist of policies, procedures, and regulations that manage the human elements of security operations. They are crucial for ensuring that employees understand their roles and responsibilities regarding organizational security. Technical controls involve the use of technology to mitigate risks, while physical controls address the protection of physical assets. Operational controls, although related to procedures, are more about the day-to-day implementation of security measures rather than policy establishment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of administrative controls?
How do administrative controls differ from technical controls?
What are some reasons for implementing regular security awareness training?
As a penetration tester, you are contracted to assess the security of a multinational corporation's internal network. The corporation has multiple interconnected sites and relies heavily on cloud services. Which of the following is the most important initial step to ensure that your testing does not impact systems outside of the agreed scope?
Start with an immediate vulnerability assessment of the IP ranges connected to their primary data center to look for potential entry points.
Assume all interconnected sites are in scope unless otherwise informed by the client in order to conduct a thorough test of the network.
Define and discuss a detailed target list with the client, including IP ranges, domains, and specified cloud services that are to be included in the assessment.
Begin testing on the client’s production cloud services to expose as many vulnerabilities as possible regardless of the scope to showcase due diligence.
Answer Description
Defining a comprehensive target list that specifies in-scope assets such as IP ranges, domains, and which cloud services are included in the test is crucial for ensuring that the penetration test is contained within the agreed scope. Testing beyond the specified target list could lead to unauthorized access and potential legal issues. Answers that suggest starting the test immediately or bypassing the scope with the excuse of finding additional vulnerabilities neglect the need for a structured approach and undermine the importance of prior agreement on the engagement scope.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is defining a target list important in penetration testing?
What are the risks of testing outside the agreed scope?
What should be included in a detailed target list for a penetration test?
Repeated instances of unauthorized data exfiltration signify that user permissions are effectively governed.
True
False
Answer Description
The statement is false because if data can be repeatedly exfiltrated without authorization, it indicates a fundamental lapse in the management of user permissions. Effective governance of user permissions would typically include implementing least privilege access controls, continuously monitoring for anomalous behavior, and employing data loss prevention (DLP) strategies to mitigate unauthorized data transfers. The repeated exfiltration suggests these controls are either absent, inadequate, or improperly configured.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are least privilege access controls?
What is data loss prevention (DLP)?
How can anomalous behavior be monitored?
During a penetration test, you notice an unusually large number of files with a .tmp extension in a system directory that typically contains very few files. What might this observation suggest?
Sequentially named document files
Presence of standard backup files
Potential remnants of malware execution
Large log file sizes
Answer Description
The presence of an unusually large number of .tmp files in a system directory could suggest that malware or unauthorized scripts have been executed on the system. These files could be remnants of malicious software that was downloaded and executed to compromise the system. It's important for penetration testers to recognize such abnormalities as potential indicators of prior compromise. Large log file sizes might simply indicate verbose logging settings or a long period without maintenance. Standard backup files are common for recovery purposes and do not necessarily suggest a compromise. Sequentially named document files could be a sign of normal user or system activity rather than a compromise.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are .tmp files and why are they created?
How can I determine if the .tmp files are a sign of malware?
What steps can a penetration tester take upon finding suspicious .tmp files?
During a penetration test, you discover evidence suggesting that an employee has been engaging in illegal activities using the company's network. Which of the following actions aligns best with professional conduct and legal responsibilities?
Ignore the findings as they are beyond the scope of the penetration test.
Turn off the affected systems to prevent any further illegal activity.
Confront the employee directly to investigate the matter further.
Immediately notify the primary or emergency contact designated by the client to relay your findings confidentially.
Answer Description
When encountering potential criminal activity during a penetration test, the tester must communicate this information to the primary or emergency contact within the organization as outlined in the communication plan. It is crucial to handle the situation with confidentiality and let the appropriate parties within the organization manage the legal response. Directly confronting the individual or ignoring the findings are not adhering to professional and ethical standards, and turning off the affected system could hinder further investigation by the appropriate authorities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a penetration test?
What are the legal responsibilities of a penetration tester?
What is the role of the communication plan in a penetration test?
What action is essential to confirm that penetration testing activities target only in-scope assets and avoid potential mission creep?
Using automated tools to define which systems or resources are tested
Selecting targets based on the information gathered during the reconnaissance phase
Questioning the client or reviewing the contracts
Presuming the targets are the same as previous engagements with the client
Answer Description
Questioning the client or reviewing the contracts is the correct answer. Doing so allows penetration testers to clarify which assets are in-scope and which are not, according to the formalized written agreement. This confirmation is vital to maintain the integrity of the engagement and ensure that only authorized systems and resources are tested. Selecting targets based on the reconnaissance phase alone may inadvertently include out-of-scope assets, leading to unauthorized testing. Using automated tools to test in-scope assets does not validate that these assets are within the approved engagement parameters, and presuming to know the targets based on previous engagements introduces risks of ignoring current formal agreements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is questioning the client crucial in penetration testing?
What are in-scope and out-of-scope assets in penetration testing?
What could happen if penetration testers assume targets based on previous engagements?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.