00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

CompTIA PenTest+ (PT0-002) Exam

The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.

Exam Overview

The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.

Exam Content

The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.

Who Should Take This Exam?

The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.

How to Prepare

Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.

Summary

The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis
Question 1 of 15

During the planning phase of a penetration test, which of the following elements would be MOST important to include in the Statement of Work to ensure that the penetration tester and the client have a common understanding of the tasks and goals?

  • Drafting a detailed checklist of potential vulnerabilities to investigate

  • Comprehensive report including executive summary and technical findings

  • Defined goals and objectives of the penetration test

  • Commercial penetration testing tools to be exclusively utilized

Question 2 of 15

During a penetration test, you are tasked with crafting a phishing campaign to test the organization's resilience to social engineering efforts. Using the Social Engineering Toolkit, which of the following would be the BEST approach to emulate a realistic spear-phishing attack?

  • Clone a known trusted site and slightly modify it to collect user credentials.

  • Replicate an exact copy of their public website to confuse employees.

  • Modify the organization's public website to redirect to your malicious site.

  • Send out generic business-related documents that contain no organization-specific information.

Question 3 of 15

During a brute force attack against an online service, the penetration tester is able to try 1000 passwords per second without any restrictions from the application. This scenario indicates that the application is not equipped with proper account lockout mechanisms.

  • False

  • True

Question 4 of 15

Tokens issued by a server during a session can be scoped strictly enough to prevent interception and reuse by an unauthorized party.

  • False

  • True

Question 5 of 15

During a penetration testing engagement, you have established persistent access on a target system. Which of the following methods is the BEST to mask your continued presence from the system administrators?

  • Installing a rootkit to conceal the presence of your tools and activities

  • Disabling all logging services on the target system

  • Hosting all backdoor connections on non-standard ports to avoid attention

  • Renaming all penetration testing tools with system default process names

  • Frequently changing file and directory permissions to maintain access

  • Cleaning all log files daily to remove any trace of unauthorized access

Question 6 of 15

During an active reconnaissance phase, a penetration tester wants to monitor and capture the interaction between a client application and its server via API calls. What tool or technique would be the best choice to accomplish this task?

  • Port scanner

  • Anti-virus software

  • Web proxy

  • Wardriving tools

Question 7 of 15

When referring to security threats, what is the primary characteristic of the activity where unsolicited messages are sent in bulk to numerous recipients?

  • Spoofing

  • Spamming

  • Brute force attacks

  • Phishing

Question 8 of 15

As a penetration tester, you are contracted to perform a security assessment for a company that utilizes multiple public cloud services. Which of the following considerations is MOST important when defining the scope of your penetration test?

  • Secure the written permission to attack from local government authorities.

  • Select the tools that will be used during the engagement.

  • Ensure the cloud service provider's policy for penetration testing is followed.

  • Determine if other organizations hosted by the same provider inadvertently come into scope.

Question 9 of 15

In the context of network security, what is the primary purpose of using a tool that employs the technique known as 'sniffing'?

  • Injecting traffic into the network

  • Monitoring and capturing network traffic

  • Decrypting SSL/TLS traffic

  • Broadcasting service set identifiers (SSIDs)

Question 10 of 15

Which type of control would include establishing a policy that mandates regular security awareness training for all employees?

  • Operational control

  • Administrative control

  • Physical control

  • Technical control

Question 11 of 15

As a penetration tester, you are contracted to assess the security of a multinational corporation's internal network. The corporation has multiple interconnected sites and relies heavily on cloud services. Which of the following is the most important initial step to ensure that your testing does not impact systems outside of the agreed scope?

  • Start with an immediate vulnerability assessment of the IP ranges connected to their primary data center to look for potential entry points.

  • Assume all interconnected sites are in scope unless otherwise informed by the client in order to conduct a thorough test of the network.

  • Define and discuss a detailed target list with the client, including IP ranges, domains, and specified cloud services that are to be included in the assessment.

  • Begin testing on the client’s production cloud services to expose as many vulnerabilities as possible regardless of the scope to showcase due diligence.

Question 12 of 15

Repeated instances of unauthorized data exfiltration signify that user permissions are effectively governed.

  • True

  • False

Question 13 of 15

During a penetration test, you notice an unusually large number of files with a .tmp extension in a system directory that typically contains very few files. What might this observation suggest?

  • Sequentially named document files

  • Presence of standard backup files

  • Potential remnants of malware execution

  • Large log file sizes

Question 14 of 15

During a penetration test, you discover evidence suggesting that an employee has been engaging in illegal activities using the company's network. Which of the following actions aligns best with professional conduct and legal responsibilities?

  • Ignore the findings as they are beyond the scope of the penetration test.

  • Turn off the affected systems to prevent any further illegal activity.

  • Confront the employee directly to investigate the matter further.

  • Immediately notify the primary or emergency contact designated by the client to relay your findings confidentially.

Question 15 of 15

What action is essential to confirm that penetration testing activities target only in-scope assets and avoid potential mission creep?

  • Using automated tools to define which systems or resources are tested

  • Selecting targets based on the information gathered during the reconnaissance phase

  • Questioning the client or reviewing the contracts

  • Presuming the targets are the same as previous engagements with the client