00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

CompTIA PenTest+ (PT0-002) Exam

The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.

Exam Overview

The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.

Exam Content

The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.

Who Should Take This Exam?

The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.

How to Prepare

Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.

Summary

The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 15

During a vulnerability assessment, you identify several devices on the network, including switches, routers, and firewalls. What method should you employ to comprehensively identify potential vulnerabilities on these network devices while minimizing risks to their operational stability?

  • TCP connect scan

  • Non-credentialed scan

  • Stealth scan

  • Credentialed scan

Question 2 of 15

As part of an internal security assessment, you are required to scan a network segment that contains older, production-critical systems known for their fragility in terms of network traffic handling. Your objective is to identify vulnerabilities without causing system disruptions. Which scanning method would be most appropriate for this scenario?

  • Non-credentialed scan

  • Stealth scan

  • TCP connect scan

  • Credentialed scan

Question 3 of 15

What is the primary goal of utilizing the methodology outlined in the OSSTMM during a penetration testing engagement?

  • To facilitate the creation of new security technologies.

  • To establish a comprehensive risk management framework.

  • To provide a scientific methodology for the accurate representation of operational security.

  • To quantify the financial investment in security controls.

Question 4 of 15

Antivirus programs solely rely on signature-based detection methods to identify and block penetration testing tools.

  • False

  • True

Question 5 of 15

During an active reconnaissance phase, a penetration tester wants to monitor and capture the interaction between a client application and its server via API calls. What tool or technique would be the best choice to accomplish this task?

  • Web proxy

  • Anti-virus software

  • Port scanner

  • Wardriving tools

Question 6 of 15

A client, operating a multinational corporation, requires a penetration test for their network infrastructure. However, due to strict data sovereignty laws, they insist that any discovered data must not leave the country of origin. The penetration test is to be performed remotely from your location in another country. Which of the following approaches would BEST align with the client's data sovereignty restrictions?

  • Utilize a jump box located within the client's country to conduct tests and analyze results

  • Limit the scope to include only the testing of public-facing services to avoid data sovereignty complications

  • Encrypting all test results to prevent unauthorized access while transmitting data back to your location

  • Instantiating a VPN to the client's network to ensure a secure connection for testing

Question 7 of 15

A penetration tester is examining a company's network mapping obtained from a recent scan. The scan reveals multiple subnets with hosts that have both Inter-Subnet and Intra-Subnet communication patterns. Considering the layers of the OSI model, what type of network device is MOST likely responsible for allowing or restricting the communication BETWEEN these subnets?

  • Switch

  • Hub

  • Router

  • Firewall without routing capabilities

Question 8 of 15

Examining metadata from company documents can potentially unveil the software versions used to create them.

  • False

  • True

Question 9 of 15

Which of the following data types can be found through strategic search engine analysis and might inadvertently reveal internal operational details or personal information when not handled properly by the organization?

  • SSL certificate details

  • Published company policies

  • File metadata

  • Social media profiles of employees

Question 10 of 15

During an authorized penetration test, you have discovered an outdated web server software running on a client's production server. Given the nature of the software, it is susceptible to a known remote code execution (RCE) vulnerability that allows an attacker to run arbitrary code on the server. What is the MOST responsible and professional action to take next?

  • Exploit the vulnerability to demonstrate the severity to the client without causing any harm to the server.

  • Run a proof-of-concept to confirm the vulnerability's exploitability before informing the client.

  • Ignore the vulnerability since it is the client's responsibility to keep software updated, not the tester's.

  • Report the vulnerability with details of the affected software, the vulnerability's impact, and suggested remediation steps to the client.

Question 11 of 15

During a penetration testing engagement, you uncover evidence that an employee of the client organization is covertly exfiltrating sensitive customer data. Which of the following actions is the BEST course of action in alignment with professional and ethical standards?

  • Wait until the end of the engagement to report the finding in the final report.

  • Ignore the finding as it is not within the original scope of the engagement.

  • Collect more evidence before reporting to make the case stronger.

  • Discuss the situation with fellow team members to decide on a proper course of action.

  • Confront the employee directly to deter further data exfiltration.

  • Report the finding immediately to the appropriate point of contact within the client organization.

Question 12 of 15

Vulnerability scanning tools automatically adjust their scanning techniques based on the detected network topology.

  • True

  • False

Question 13 of 15

During a penetration test, what document specifies the authorized time of day for testing activities and the types of tests that are permitted or prohibited?

  • Rules of Engagement document

  • Master Service Agreement

  • Non-disclosure Agreement (NDA)

  • Service-Level Agreement (SLA)

Question 14 of 15

During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?

  • Use an aggressive scanning method to finish the scan more quickly.

  • Run the scan during peak business hours to blend in with regular traffic.

  • Throttle the scan speed to use minimal bandwidth and prevent network congestion.

  • Scan without credentials to reduce the amount of data transferred.

Question 15 of 15

The General Data Protection Regulation (GDPR) requires a company to obtain explicit consent from individuals before a penetration tester is allowed to access their personal data during a security assessment.

  • True

  • False