CompTIA PenTest+ Practice Test (PT0-002)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-002 Information
CompTIA PenTest+ (PT0-002) Exam
The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.
Exam Overview
The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.
Exam Content
The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.
Who Should Take This Exam?
The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.
How to Prepare
Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.
Summary
The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.
Scroll down to see your responses and detailed results
Free CompTIA PenTest+ PT0-002 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Planning and ScopingInformation Gathering and Vulnerability ScanningAttacks and ExploitsReporting and CommunicationTools and Code Analysis
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
During a vulnerability assessment, you identify several devices on the network, including switches, routers, and firewalls. What method should you employ to comprehensively identify potential vulnerabilities on these network devices while minimizing risks to their operational stability?
TCP connect scan
Non-credentialed scan
Stealth scan
Credentialed scan
Answer Description
The correct answer is 'Credentialed scan'. Performing credentialed scans on network devices enables deeper visibility into their configurations and potential vulnerabilities without causing the disruptions often associated with non-credentialed scans. These scans can access logs, configurations, and other details that are not available to a non-credentialed scan while reducing the chance of causing issues to the device's stability. Credentialed scans are considered best practices when allowed and possible on devices as they provide the most thorough results with fewer false positives and less operational risk to the devices being scanned.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a credentialed scan and how is it different from a non-credentialed scan?
Why are credentialed scans considered best practices in vulnerability assessments?
What kinds of vulnerabilities can a credentialed scan help identify?
As part of an internal security assessment, you are required to scan a network segment that contains older, production-critical systems known for their fragility in terms of network traffic handling. Your objective is to identify vulnerabilities without causing system disruptions. Which scanning method would be most appropriate for this scenario?
Non-credentialed scan
Stealth scan
TCP connect scan
Credentialed scan
Answer Description
A credentialed scan is the appropriate choice when dealing with fragile systems. This method uses valid access credentials to perform a more in-depth and safer examination of the target systems, reducing the risk of causing disruptions which may occur with more aggressive uncredentialed scans that can overwhelm sensitive systems. A non-credentialed scan can risk causing issues with fragile systems due to the more intrusive nature of the probing. A stealth scan's main purpose is to avoid detection, and while it can be less noisy on the network, it might still cause a fragile system to become unstable. Transmission Control Protocol (TCP) connect scans are more intrusive as they establish a full TCP connection, potentially leading to system instability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of a credentialed scan?
How does a non-credentialed scan differ from a credentialed scan?
What situations would call for using a stealth scan instead?
What is the primary goal of utilizing the methodology outlined in the OSSTMM during a penetration testing engagement?
To facilitate the creation of new security technologies.
To establish a comprehensive risk management framework.
To provide a scientific methodology for the accurate representation of operational security.
To quantify the financial investment in security controls.
Answer Description
The primary goal of using the OSSTMM is to provide a scientific methodology for the accurate representation of operational security. The OSSTMM focuses on testing the operational security of physical locations, networks, and systems to ensure that the testing process is comprehensive and repeatable. This is important because it not only standardizes penetration testing across different environments but also ensures that the results are actionable and reliable. Option B is incorrect because, while risk management is a component of penetration testing, it is not the primary goal of the OSSTMM. Option C is incorrect because this methodology is not primarily about quantifying security spending. Option D is incorrect as its primary goal is not the generation of new security technologies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does OSSTMM stand for?
What are the components of operational security tested by OSSTMM?
Why is standardization in penetration testing important?
Antivirus programs solely rely on signature-based detection methods to identify and block penetration testing tools.
False
True
Answer Description
The correct answer is false. Modern antivirus programs do not solely rely on signature-based detection. While signature-based detection is a common method that involves matching known malware signatures to files, advanced antivirus solutions also use heuristic analysis, behavioral detection, and anomaly detection to identify malicious activities or files. These methods enable antivirus programs to detect previously unknown threats and the use of penetration testing tools even when they don't match a known signature.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are signature-based detection methods in antivirus programs?
What are some advanced detection methods that antivirus programs use?
What are penetration testing tools, and why might antivirus programs flag them?
During an active reconnaissance phase, a penetration tester wants to monitor and capture the interaction between a client application and its server via API calls. What tool or technique would be the best choice to accomplish this task?
Web proxy
Anti-virus software
Port scanner
Wardriving tools
Answer Description
Using a web proxy is the correct answer because it acts as an intermediary for requests from clients seeking resources from servers. When a client makes an API request, it goes through the proxy, which allows the tester to examine and capture the request and response data. This is critical when analyzing how client and server communicate and identifying potential security issues within the API calls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a web proxy and how does it work?
How do penetration testers use web proxies to identify security issues?
What are some popular web proxy tools used in penetration testing?
A client, operating a multinational corporation, requires a penetration test for their network infrastructure. However, due to strict data sovereignty laws, they insist that any discovered data must not leave the country of origin. The penetration test is to be performed remotely from your location in another country. Which of the following approaches would BEST align with the client's data sovereignty restrictions?
Utilize a jump box located within the client's country to conduct tests and analyze results
Limit the scope to include only the testing of public-facing services to avoid data sovereignty complications
Encrypting all test results to prevent unauthorized access while transmitting data back to your location
Instantiating a VPN to the client's network to ensure a secure connection for testing
Answer Description
The correct answer is 'Utilize a jump box located within the client's country to conduct tests and analyze results,' because it addresses the data sovereignty issue by ensuring that any testing and resulting data remain within the country, adhering to local laws while still allowing the penetration tester to perform their duties from a remote location. Instantiating a VPN would not ensure compliance with data sovereignty as the data might transit through other jurisdictions. Encrypting all test results has merit for securing the data but doesn't prevent data from leaving the country. Testing only public-facing services may still risk violating data sovereignty laws if any resulting data is stored or analyzed outside the target country.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a jump box and how does it work in penetration testing?
What are data sovereignty laws, and why are they important for businesses?
Why is using a VPN not sufficient for complying with data sovereignty laws?
A penetration tester is examining a company's network mapping obtained from a recent scan. The scan reveals multiple subnets with hosts that have both Inter-Subnet and Intra-Subnet communication patterns. Considering the layers of the OSI model, what type of network device is MOST likely responsible for allowing or restricting the communication BETWEEN these subnets?
Switch
Hub
Router
Firewall without routing capabilities
Answer Description
A router primarily operates at layer 3 (the Network layer) of the OSI model and is designed to connect multiple subnets and direct data packets between them. Routers use IP addresses to make forwarding decisions and can allow or restrict traffic between subnets. In contrast, switches typically operate at layer 2 (Data Link layer) and handle traffic within the same subnet. Hubs, being even more limited, operate at layer 1 (Physical layer) and merely replicate traffic to all ports. Firewalls, though they can restrict traffic between subnets, are not inherently responsible for allowing communication at the network layer but rather for securing the network by applying policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for a router to operate at layer 3 of the OSI model?
How do routers and switches differ in their communication capabilities?
What role do firewalls play in network communication?
Examining metadata from company documents can potentially unveil the software versions used to create them.
False
True
Answer Description
File metadata can include details such as the software used to create a document and its version, which could be exploited if the software is known to have vulnerabilities. This information can aid a penetration tester in pinpointing specific software vulnerabilities to target within an organization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is file metadata?
How can vulnerabilities in software versions be exploited?
What is the role of a penetration tester?
Which of the following data types can be found through strategic search engine analysis and might inadvertently reveal internal operational details or personal information when not handled properly by the organization?
SSL certificate details
Published company policies
File metadata
Social media profiles of employees
Answer Description
File metadata often contains information about the author, organization, document change history, and sometimes even geolocation data. Such metadata can be exposed accidentally by an organization through indexed documents and files on search engines. Strategic search engine analysis can potentially uncover this metadata. SSL certificates and social media profiles do not directly disclose internal operational details as part of their standard information. Company policies are usually general documents and do not contain the sort of specific operational details that metadata might.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is file metadata and why is it important?
How can file metadata be exposed through search engines?
What are the risks associated with exposed file metadata?
During an authorized penetration test, you have discovered an outdated web server software running on a client's production server. Given the nature of the software, it is susceptible to a known remote code execution (RCE) vulnerability that allows an attacker to run arbitrary code on the server. What is the MOST responsible and professional action to take next?
Exploit the vulnerability to demonstrate the severity to the client without causing any harm to the server.
Run a proof-of-concept to confirm the vulnerability's exploitability before informing the client.
Ignore the vulnerability since it is the client's responsibility to keep software updated, not the tester's.
Report the vulnerability with details of the affected software, the vulnerability's impact, and suggested remediation steps to the client.
Answer Description
When a known vulnerability is identified, the penetration tester's responsibility is to report the vulnerability to the organization in a detailed and timely manner. The report should include the impact of the vulnerability, how it was discovered, and recommended remediation steps. The penetration tester must not exploit the vulnerability without explicit authorization, as doing so can lead to legal issues and would be against the professional code of conduct. Running a proof-of-concept without permission could potentially disrupt the client's operations and would also be unethical. Ignoring the vulnerability fails the client and does not fulfill the tester's obligation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are remote code execution (RCE) vulnerabilities?
What should be included in a vulnerability report?
Why is it important to avoid exploiting vulnerabilities during a penetration test?
During a penetration testing engagement, you uncover evidence that an employee of the client organization is covertly exfiltrating sensitive customer data. Which of the following actions is the BEST course of action in alignment with professional and ethical standards?
Wait until the end of the engagement to report the finding in the final report.
Ignore the finding as it is not within the original scope of the engagement.
Collect more evidence before reporting to make the case stronger.
Discuss the situation with fellow team members to decide on a proper course of action.
Confront the employee directly to deter further data exfiltration.
Report the finding immediately to the appropriate point of contact within the client organization.
Answer Description
The immediate reporting of the discovered criminal activity to the appropriate point of contact within the client organization is the best course of action because it adheres to professional and ethical standards of conduct, ensuring that potential criminal activity is addressed promptly and through the proper channels. Delaying reporting, confronting the employee directly, or discussing with peers could lead to potential complications, legal issues, or breaches of the scope of engagement and confidentiality agreements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to report findings immediately during a penetration test?
What are some professional and ethical standards for penetration testers?
What should a penetration tester include in their report after discovering unethical behavior?
Vulnerability scanning tools automatically adjust their scanning techniques based on the detected network topology.
True
False
Answer Description
Vulnerability scanning tools cannot automatically adjust their scanning techniques based on the detected network topology. Penetration testers must understand the network topology and manually configure the scanning tools to ensure effective and thorough scanning. This involves selecting the appropriate scanning methods and settings that align with the network's architecture and design in order to minimize the risk of disruption and maximize the detection of potential vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are vulnerability scanning tools?
What is network topology?
Why can't scanning tools automatically adjust to network topology?
During a penetration test, what document specifies the authorized time of day for testing activities and the types of tests that are permitted or prohibited?
Rules of Engagement document
Master Service Agreement
Non-disclosure Agreement (NDA)
Service-Level Agreement (SLA)
Answer Description
The Rules of Engagement document is essential as it outlines the boundaries and guidelines of the penetration test agreed upon by both the tester and the client. It includes critical details such as the timing of the tests and the specific types of tests that can be performed. This ensures legal compliance and aligns the testing activities with the client's constraints and objectives.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is included in the Rules of Engagement document?
How does the Rules of Engagement document protect both the client and the tester?
What happens if a penetration test goes beyond the established Rules of Engagement?
During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?
Use an aggressive scanning method to finish the scan more quickly.
Run the scan during peak business hours to blend in with regular traffic.
Throttle the scan speed to use minimal bandwidth and prevent network congestion.
Scan without credentials to reduce the amount of data transferred.
Answer Description
Reducing the speed at which the scan is carried out (Throttling the scan speed) is the best approach when dealing with bandwidth limitations. It ensures that the vulnerability scan does not consume excessive bandwidth, which could slow down the network for legitimate users or cause disruptions. It also helps avoid triggering alarms that could alert network administrators to the scan's presence. Although performing the scan during off-peak hours or using less intrusive scan types may help, they do not directly address the problem of limited bandwidth as effectively as actively managing the scan's bandwidth usage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to throttle scan speed?
Why is running a scan during peak hours not a good idea?
What are some aggressive scanning methods?
The General Data Protection Regulation (GDPR) requires a company to obtain explicit consent from individuals before a penetration tester is allowed to access their personal data during a security assessment.
True
False
Answer Description
GDPR imposes strict rules on the processing of personal data of EU residents, including the need for explicit consent for certain actions. However, it does not specifically mandate that a company must obtain explicit consent from individuals before a penetration tester can access their personal data during a security assessment. The necessity for consent depends on the lawful basis for processing the data, and in the context of penetration testing, the lawful basis might be 'compliance with a legal obligation' or 'legitimate interests' of the company to secure its systems. It's important for penetration testers to work with legal counsel to ensure their testing activities are GDPR-compliant.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the lawful bases for processing personal data under GDPR?
What does GDPR stand for and why is it important?
What does explicit consent mean in the context of data protection?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.