00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

CompTIA PenTest+ (PT0-002) Exam

The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.

Exam Overview

The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.

Exam Content

The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.

Who Should Take This Exam?

The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.

How to Prepare

Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.

Summary

The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis
Question 1 of 15

During a penetration test, you have identified that an organization's web application is vulnerable to SQL injection attacks. Which of the following recommendations would be most effective in mitigating this risk?

  • Encrypt passwords stored within the application database

  • Sanitize user input and utilize parameterized queries

  • Keep the web server and database server software up to date through regular patch management

  • Implement multifactor authentication for user logins

  • Enforce strong password requirements for all application users

Question 2 of 15

Which method of using search engines for passive reconnaissance is most likely to yield comprehensive insight into potential vulnerabilities within a target organization's web applications?

  • Using advanced search engine queries with operators to find exposed sensitive information or misconfigurations.

  • Looking up the main company website to analyze the business' profile and obtain general contact information.

  • Searching the company's social media feeds for general technology updates or event announcements.

  • Reviewing the company's public financial reports to identify budget allocations for cybersecurity.

Question 3 of 15

What is the primary characteristic of a direct-to-origin attack in the context of cloud technologies?

  • Bypassing content delivery networks to target the server or service directly

  • Flooding a network with traffic to disrupt service availability

  • Intercepting data packets between the client and the server

  • Exploiting weaknesses in the encryption algorithms of data in transit

Question 4 of 15

During a penetration test, establishing a primary contact person with the client organization is not necessary if the penetration tester has been granted authorization to test the systems.

  • True

  • False

Question 5 of 15

Why is it imperative for penetration testers to remove any credentials they have created during an assessment after the engagement concludes?

  • Because the credentials may be required for client-side auditing purposes

  • To ensure penetration testers can reuse the same credentials for future tests

  • To revert systems to their original security posture and prevent misuse by unauthorized parties

  • It is a legal requirement in most countries to delete any data produced during a test

Question 6 of 15

Imagine you are conducting a penetration test and need to transfer a file from your attacking machine to a compromised Windows host. You decide to use a networking utility known for its simplicity and effectiveness in creating ad-hoc connections between two machines. What command should be executed on the attacker's machine to serve a file named 'payload.exe' over port 4444?

  • nc -lvp 4444 < payload.exe

  • nc -p 4444 -w 3 < payload.exe

  • nc -ulvp 4444 < payload.exe

  • nc -l -p 4444 > payload.exe

Question 7 of 15

You are conducting a security audit on a web page and have found a section where user input is dynamically inserted into the document without proper sanitation. To confirm the existence of this client-side security flaw, you intend to inject code that creates a dialog box displaying 'Test'. Which of the following JavaScript snippets would be correctly executed to demonstrate the vulnerability?

  • alert('Test');

  • confirm('Test');

  • aler't('Test');

  • Alert('Test');

Question 8 of 15

Your penetration testing firm has been contracted to conduct a security assessment of a web application. The client has specified the use of recognized industry standards. As part of your scoping document, you decide to incorporate the OWASP Top 10 to structure the testing methodology. Which of the following best describes the relevance of including the OWASP Top 10 in your scoping document?

  • It sets the legal framework for conducting penetration tests, ensuring compliance with international laws and regulations.

  • It mandates a mandatory checklist that the client must resolve before a penetration test can be considered valid.

  • It helps prioritize the focus of the penetration test on common web application vulnerabilities recognized as significant industry-wide.

  • It provides a complete list of all possible vulnerabilities in any given web application, ensuring a penetration test will cover every known vulnerability.

Question 9 of 15

Is it the sole responsibility of the client to perform a retest to verify that the issued recommendations have been effectively implemented after the initial penetration test?

  • No

  • Yes

Question 10 of 15

During a penetration testing contract, the client has specifically requested an evaluation of existing physical security measures. Your assessment reveals that the current video surveillance system only covers entry and exit points but does not monitor the server room, which houses critical infrastructure. When compiling your findings report, how should this observation be presented to the client?

  • A recommendation for increasing surveillance to include critical areas such as the server room

  • Reducing the hours of surveillance to conserve resources during business hours

  • Upgrading the resolution of current cameras to capture clearer imagery

  • Maintaining the current surveillance setup since it adequately covers all necessary areas

Question 11 of 15

A penetration tester is assessing an organization's susceptibility to information leakage via steganography. The tester suspects that sensitive data might be secreted within ASCII text using whitespace. Which steganography tool would be most appropriate to analyze the texts for hidden messages?

  • Coagula

  • Openstego

  • Steghide

  • Snow

Question 12 of 15

You are conducting a penetration test against an organization and have obtained the following information from an Nmap scan: Nmap scan report for 192.168.1.105 Host is up (0.0010s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: 2048 SHA256:XxXXXxxXxxxXxXxxxXxxXxxXxXXXxxXxX (RSA) 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) 111/tcp open rpcbind 2-4 (RPC #100000) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP) Based on the fingerprinting data obtained from the scan, which of the following conclusions can be accurately drawn about the target system?

  • The target uses a custom operating system, as indicated by the mix of services.

  • The target system is likely running a Linux-based operating system.

  • The target system is a dedicated Microsoft Windows Server machine.

  • The target system is running outdated network services with no implications of the underlying OS.

Question 13 of 15

Which of the following options is the BEST method to identify assets hosted in the cloud as part of an organization's infrastructure during a penetration test?

  • Employing cloud service discovery tools designed to query cloud provider APIs and enumerate resources.

  • Utilizing traditional network scanners to scan IP ranges owned by the organization.

  • Conducting wardriving around the vicinity of the organization's physical location.

  • Reviewing job listings from the organization to infer cloud services in use.

Question 14 of 15

During a penetration testing exercise, you have gained access to a Windows server and intend to use a post-exploitation tool to extract credential data from the system memory. Which command would you use with the tool to retrieve this sensitive information?

  • tokenselevate sekurlsacredentials

  • privilegedebug sekurlsalogonpasswords

  • mimikatz::export cache

  • kerberos::list_creds

Question 15 of 15

During a penetration test, you have successfully exploited a vulnerability on a Windows server and have gained access to the cmd.exe command shell. You want to upgrade this shell to have enhanced capabilities, including the ability to transfer files securely and manipulate the Windows Registry from your attack platform. Which of the following actions would BEST accomplish this?

  • Open a PowerShell session to utilize its native features

  • Deploy an additional cmd.exe shell for registry manipulation

  • Use the cmd.exe shell to manually transfer files using FTP

  • Generate a Meterpreter payload and execute it on the target system to upgrade the shell

  • Connect to the server with a Telnet client to achieve persistent access

  • Initiate an SSH connection to the server to enable secure file transfers