00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

CompTIA PenTest+ (PT0-002) Exam

The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.

Exam Overview

The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.

Exam Content

The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.

Who Should Take This Exam?

The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.

How to Prepare

Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.

Summary

The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 15

A penetration tester is examining a company's network mapping obtained from a recent scan. The scan reveals multiple subnets with hosts that have both Inter-Subnet and Intra-Subnet communication patterns. Considering the layers of the OSI model, what type of network device is MOST likely responsible for allowing or restricting the communication BETWEEN these subnets?

  • You selected this option

    Router

  • You selected this option

    Switch

  • You selected this option

    Hub

  • You selected this option

    Firewall without routing capabilities

Question 2 of 15

During an authorized penetration test, you have discovered an outdated web server software running on a client's production server. Given the nature of the software, it is susceptible to a known remote code execution (RCE) vulnerability that allows an attacker to run arbitrary code on the server. What is the MOST responsible and professional action to take next?

  • You selected this option

    Run a proof-of-concept to confirm the vulnerability's exploitability before informing the client.

  • You selected this option

    Exploit the vulnerability to demonstrate the severity to the client without causing any harm to the server.

  • You selected this option

    Report the vulnerability with details of the affected software, the vulnerability's impact, and suggested remediation steps to the client.

  • You selected this option

    Ignore the vulnerability since it is the client's responsibility to keep software updated, not the tester's.

Question 3 of 15

Which of the following data types can be found through strategic search engine analysis and might inadvertently reveal internal operational details or personal information when not handled properly by the organization?

  • You selected this option

    Published company policies

  • You selected this option

    SSL certificate details

  • You selected this option

    File metadata

  • You selected this option

    Social media profiles of employees

Question 4 of 15

As part of an internal security assessment, you are required to scan a network segment that contains older, production-critical systems known for their fragility in terms of network traffic handling. Your objective is to identify vulnerabilities without causing system disruptions. Which scanning method would be most appropriate for this scenario?

  • You selected this option

    Non-credentialed scan

  • You selected this option

    Stealth scan

  • You selected this option

    TCP connect scan

  • You selected this option

    Credentialed scan

Question 5 of 15

During an active reconnaissance phase, a penetration tester wants to monitor and capture the interaction between a client application and its server via API calls. What tool or technique would be the best choice to accomplish this task?

  • You selected this option

    Wardriving tools

  • You selected this option

    Web proxy

  • You selected this option

    Anti-virus software

  • You selected this option

    Port scanner

Question 6 of 15

During a penetration test, what document specifies the authorized time of day for testing activities and the types of tests that are permitted or prohibited?

  • You selected this option

    Service-Level Agreement (SLA)

  • You selected this option

    Rules of Engagement document

  • You selected this option

    Non-disclosure Agreement (NDA)

  • You selected this option

    Master Service Agreement

Question 7 of 15

Antivirus programs solely rely on signature-based detection methods to identify and block penetration testing tools.

  • You selected this option

    True

  • You selected this option

    False

Question 8 of 15

Vulnerability scanning tools automatically adjust their scanning techniques based on the detected network topology.

  • You selected this option

    False

  • You selected this option

    True

Question 9 of 15

Examining metadata from company documents can potentially unveil the software versions used to create them.

  • You selected this option

    True

  • You selected this option

    False

Question 10 of 15

The General Data Protection Regulation (GDPR) requires a company to obtain explicit consent from individuals before a penetration tester is allowed to access their personal data during a security assessment.

  • You selected this option

    False

  • You selected this option

    True

Question 11 of 15

During a penetration testing engagement, you uncover evidence that an employee of the client organization is covertly exfiltrating sensitive customer data. Which of the following actions is the BEST course of action in alignment with professional and ethical standards?

  • You selected this option

    Wait until the end of the engagement to report the finding in the final report.

  • You selected this option

    Ignore the finding as it is not within the original scope of the engagement.

  • You selected this option

    Discuss the situation with fellow team members to decide on a proper course of action.

  • You selected this option

    Collect more evidence before reporting to make the case stronger.

  • You selected this option

    Confront the employee directly to deter further data exfiltration.

  • You selected this option

    Report the finding immediately to the appropriate point of contact within the client organization.

Question 12 of 15

A client, operating a multinational corporation, requires a penetration test for their network infrastructure. However, due to strict data sovereignty laws, they insist that any discovered data must not leave the country of origin. The penetration test is to be performed remotely from your location in another country. Which of the following approaches would BEST align with the client's data sovereignty restrictions?

  • You selected this option

    Utilize a jump box located within the client's country to conduct tests and analyze results

  • You selected this option

    Instantiating a VPN to the client's network to ensure a secure connection for testing

  • You selected this option

    Limit the scope to include only the testing of public-facing services to avoid data sovereignty complications

  • You selected this option

    Encrypting all test results to prevent unauthorized access while transmitting data back to your location

Question 13 of 15

What is the primary goal of utilizing the methodology outlined in the OSSTMM during a penetration testing engagement?

  • You selected this option

    To facilitate the creation of new security technologies.

  • You selected this option

    To quantify the financial investment in security controls.

  • You selected this option

    To establish a comprehensive risk management framework.

  • You selected this option

    To provide a scientific methodology for the accurate representation of operational security.

Question 14 of 15

During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?

  • You selected this option

    Run the scan during peak business hours to blend in with regular traffic.

  • You selected this option

    Use an aggressive scanning method to finish the scan more quickly.

  • You selected this option

    Throttle the scan speed to use minimal bandwidth and prevent network congestion.

  • You selected this option

    Scan without credentials to reduce the amount of data transferred.

Question 15 of 15

During a vulnerability assessment, you identify several devices on the network, including switches, routers, and firewalls. What method should you employ to comprehensively identify potential vulnerabilities on these network devices while minimizing risks to their operational stability?

  • You selected this option

    Stealth scan

  • You selected this option

    Non-credentialed scan

  • You selected this option

    Credentialed scan

  • You selected this option

    TCP connect scan