00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-90 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

The CompTIA PenTest+ (PT0-002) is a key certification for cybersecurity professionals, focusing on penetration testing and vulnerability management. This exam validates a practitioner's ability to conduct comprehensive penetration tests across diverse environments and includes a blend of performance-based and multiple-choice questions. It is globally recognized and ensures that professionals have up-to-date skills in identifying and managing network vulnerabilities.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Objectives:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis
Question 1 of 15

When conducting a vulnerability scan, what should a penetration tester implement to reduce the risk of overloading the target system and potentially avoiding detection by the target's intrusion detection systems?

  • Implementing query throttling

  • Scanning during peak business hours

  • Disabling all scan randomization features

  • Increasing the scan's speed to maximum

Question 2 of 15

You have completed a penetration test for a large financial organization and are required to share the final report containing sensitive vulnerability details with multiple stakeholders. Which method should you use to distribute the report securely, as per best practices?

  • Distributing physical copies of the report in sealed envelopes via courier services.

  • Posting direct download links to the report on a private forum frequented by the stakeholders.

  • Storing the report on a cloud service without implementing user-specific access controls.

  • Uploading the report to a password-protected public website where stakeholders can download it.

  • Sending the report via standard email with no encryption.

  • Encrypting the report and sending it via an encrypted email service, accessible only to authorized stakeholders with the decryption key.

Question 3 of 15

Reviewing contracts with the client prior to a penetration test is recommended but not required, since the rules of engagement can be communicated verbally.

  • The statement is true.

  • The statement is false.

Question 4 of 15

During a penetration testing engagement, you are tasked with identifying cloud-based resources associated with the target organization to find potential entry points. Which tool would be best suited for enumerating subdomains and services for cloud platforms like AWS, Azure, and Google Cloud?

  • CloudBrute

  • Maltego

  • theHarvester

  • Shodan

Question 5 of 15

As a penetration tester, you are tasked with gathering intelligence about a target company's technology stack without alerting them to your activities. Which of the following methods would provide insight into the technology stack without directly engaging with the target's systems or networks?

  • Performing DNS lookups to identify all the subdomains of the company

  • Conducting a scan of the target's IP address space to detect running services

  • Reviewing the target company's job listings for technology skill requirements

  • Establishing a connection to the target's network to monitor outgoing traffic

Question 6 of 15

As a penetration tester, you are authorized to test an application's API that employs scoped access tokens. When you request a token from the authorization server specifying a particular scope, you receive a token with broader privileges than expected. What should your next course of action be to ethically continue the test according to the rules of engagement?

  • Continue testing using the received token but avoid accessing the functionalities that are outside the initial scope.

  • Inform the client and request a token with the correct scope.

  • Manually adjust the scope in the token to match the intended permissions and proceed with testing.

  • Use the broader scoped token to test additional functionalities since it will provide a more comprehensive security assessment.

Question 7 of 15

A penetration tester is assessing an organization's susceptibility to information leakage via steganography. The tester suspects that sensitive data might be secreted within ASCII text using whitespace. Which steganography tool would be most appropriate to analyze the texts for hidden messages?

  • Openstego

  • Snow

  • Coagula

  • Steghide

Question 8 of 15

While performing a security assessment for a company's wireless network, you notice an unverified access point with a network name mimicking that of the organization's officially used names for Wi-Fi connections. What technique would be most effective in confirming whether this access point is unauthorized and set up with malicious intent?

  • Intercept and scrutinize the data packets from the network point in question for inconsistencies with the organization's wireless security protocols.

  • Review the list of devices connected to the sanctioned network points to see if the dubious device is listed as a client.

  • Change the network names used by the organization's official Wi-Fi to determine if the questionable access point adapts its broadcasted name in response.

  • Interview staff members to verify whether they recognize or have connected to this network point to collect data on its authenticity.

Question 9 of 15

What set of standards pertains specifically to the security of cardholder data and is critical for organizations that handle branded credit cards from the major card schemes?

  • Federal Information Security Management Act (FISMA)

  • Health Insurance Portability and Accountability Act (HIPAA)

  • Payment Card Industry Data Security Standard (PCI DSS)

  • General Data Protection Regulation (GDPR)

Question 10 of 15

A penetration tester is crafting an email to impersonate a senior executive of a large corporation as part of a security assessment. The goal is to manipulate another high-ranking executive into disclosing sensitive company information. Which of the following tactics would be MOST effective for this scenario?

  • Initiate a generic email phishing campaign with a broad and common theme hoping to catch the executive among other employees.

  • Craft the content to seem like an urgent issue unique to the company that requires immediate attention, using specific jargon and references known only to the executive team.

  • Register a domain name that is a common misspelling of the company’s actual domain to send the email from, in the hopes that it goes unnoticed.

  • Impersonate a trusted co-worker in a department not usually interacting with the executive to increase the likelihood of the executive responding due to curiosity.

Question 11 of 15

During a penetration testing engagement, you are tasked with gathering open-source intelligence (OSINT) on a client's domain to identify email addresses and employee names which could later be used for a social engineering attack vector. Which command line tool would be most effective for searching publicly available information to accomplish this task?

  • John the Ripper

  • Nmap

  • Nikto

  • theHarvester

Question 12 of 15

Antivirus programs solely rely on signature-based detection methods to identify and block penetration testing tools.

  • True

  • False

Question 13 of 15

When utilizing Nmap for vulnerability scanning, which of the following describes the primary function of the -sT option?

  • Running a ping sweep to discover online hosts.

  • Executing a User Datagram Protocol (UDP) scan.

  • Conducting a stealthy half-open TCP scan.

  • Performing a TCP connect scan.

Question 14 of 15

In a penetration test report, which section is strategically curated to summarize critical security issues and align them with business objectives for the organization's decision-makers?

  • Conclusion and recommendations

  • Executive summary

  • Detailed findings and evidence

  • Methodology description

Question 15 of 15

During a penetration testing engagement for a financial institution, your team is required to assess the security of the client's payment processing system which stores and transmits credit card data. What type of document is MOST important to review before beginning any testing to ensure compliance with industry regulations?

  • Master service agreement

  • Payment Card Industry Data Security Standard (PCI DSS) documentation

  • Service-level agreement (SLA)

  • Non-disclosure agreement (NDA)