00:15:00

Free CompTIA PenTest+ PT0-002 Practice Test

Prepare for the CompTIA PenTest+ PT0-002 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Planning and Scoping
    • Information Gathering and Vulnerability Scanning
    • Attacks and Exploits
    • Reporting and Communication
    • Tools and Code Analysis
Question 1 of 15

A penetration tester has gained access to a network and would like to determine what other machines are active on the subnet. Which of the following techniques should the tester use to quickly and efficiently enumerate devices on the network without triggering potential intrusion detection systems?

  • ARP scan

  • ICMP echo request

  • Service version scan

  • Port scan with SYN packets

Question 2 of 15

What is the primary purpose of including screenshots within the report documentation of a penetration test?

  • To educate the client on how to use different penetration testing tools

  • To enhance the aesthetic appeal of the report

  • To provide visual evidence and support the reproduction of issues

  • To illustrate step-by-step process of the penetration testing tools used

Question 3 of 15

During a penetration test, you are writing a Python script to automate the extraction of subdomains from a lengthy DNS enumeration tool output. You decide to use a string operator to check if a specific subdomain exists within a line of the output before adding it to your list. Which of the following string operators would allow you to perform this check?

  • ==

  • %

  • in

  • +=

Question 4 of 15

During a penetration test, you have identified that an organization's web application is vulnerable to SQL injection attacks. Which of the following recommendations would be most effective in mitigating this risk?

  • Sanitize user input and utilize parameterized queries

  • Encrypt passwords stored within the application database

  • Keep the web server and database server software up to date through regular patch management

  • Implement multifactor authentication for user logins

  • Enforce strong password requirements for all application users

Question 5 of 15

What term is used to describe an attack that overloads a system's resources, rendering it unable to respond to legitimate traffic?

  • Data corruption

  • Resource exhaustion

  • Credential harvesting

  • Amplification attack

Question 6 of 15

As a penetration tester, you are authorized to test an application's API that employs scoped access tokens. When you request a token from the authorization server specifying a particular scope, you receive a token with broader privileges than expected. What should your next course of action be to ethically continue the test according to the rules of engagement?

  • Continue testing using the received token but avoid accessing the functionalities that are outside the initial scope.

  • Use the broader scoped token to test additional functionalities since it will provide a more comprehensive security assessment.

  • Inform the client and request a token with the correct scope.

  • Manually adjust the scope in the token to match the intended permissions and proceed with testing.

Question 7 of 15

A penetration tester is conducting an assessment and has gained initial access to a target system. To maintain access without alerting the network-based intrusion detection system (IDS), they decide to exfiltrate sensitive data. Which of the following techniques would effectively obfuscate the data being exfiltrated and is less likely to trigger an IDS alert?

  • Encoding the data with Base64 before transmission

  • Using steganography to embed the data within an image file

  • Compressing the data into a ZIP file with password protection before transmission

  • Encrypting the data using a symmetric encryption algorithm before transmission

Question 8 of 15

When scoping a penetration test, why is it imperative to ascertain whether the targets are first-party or third-party hosted?

  • To ensure appropriate permissions are obtained and legal requirements are met for the assets being tested

  • To determine the range of tools and techniques permitted during the test

  • To establish whether the penetration test should be black box, grey box, or white box

  • To decide whether the test should be conducted during business hours or after hours only

Question 9 of 15

In a penetration testing engagement, you discover that a client's web application is improperly using data received from form submissions, leading to a high-risk vulnerability. In the final report, you advise on a defense mechanism that separates the input content from the database command. Which recommendation most effectively mitigates the identified risk?

  • Escape all special characters in the form submission data to neutralize any malicious payloads.

  • Enforce strict validation checks in the browser to ensure only clean data is submitted to the server.

  • Implement parameterized queries as this method prevents attacker-provided data from being treated as executable instructions.

  • Limit the number of characters in form text inputs to reduce the risk of hazardous commands being injected.

  • Rely on the inherent security of stored procedures to handle any direct interaction with the database.

Question 10 of 15

When preparing a penetration test report, what type of information should be prioritized to address the concerns of technical staff within an organization?

  • An opinion on financial investment strategies for cybersecurity based on the penetration test

  • Detailed findings, including the risk rating and in-depth technical remediation recommendations

  • A high-level executive summary without in-depth technical details

  • A list of recommended team-building activities to improve security awareness

Question 11 of 15

During a penetration test, you discover that the client's web application is storing user passwords in a database using a hashing algorithm without a salt. You need to report this finding and recommend an appropriate remediation strategy. Which recommendation enhances the security of password storage?

  • Use SHA-256 with a dynamic salt for hashing each user's password.

  • Store passwords using reversible AES encryption.

  • Convert existing hashes to MD5 with a dynamic salt for added security.

  • Implement bcrypt with a dynamic salt for hashing each user's password.

Question 12 of 15

During a penetration test, if a Denial of Service (DoS) attack is not explicitly prohibited in the rules of engagement, it is permissible to conduct such a test without further confirmation from the client.

  • True

  • False

Question 13 of 15

During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?

  • Scan without credentials to reduce the amount of data transferred.

  • Run the scan during peak business hours to blend in with regular traffic.

  • Throttle the scan speed to use minimal bandwidth and prevent network congestion.

  • Use an aggressive scanning method to finish the scan more quickly.

Question 14 of 15

During a penetration testing engagement, you are reviewing server log files and observe a high number of login attempts from foreign IP addresses, frequent access requests for unusual files, and command history that includes reconnaissance tools not used by any team member. These observations are critical to communicate because they could suggest what?

  • Team members are likely conducting stress tests on the server.

  • The system may have been previously compromised.

  • A scheduled backup of server files is in progress.

  • Routine maintenance is being performed by the IT department.

  • The system's firewall is automatically blocking potential threats effectively.

  • The intrusion detection system is functioning with high accuracy.

Question 15 of 15

During a social engineering attack, an adversary decides to tailor their communication style to match that of their target, trying to establish common ground based on shared hobbies and professional interests. Which principle of influence is the attacker primarily exploiting in this situation?

  • Reciprocity

  • Social proof

  • Likeness

  • Consistency