CompTIA PenTest+ Practice Test (PT0-002)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-002 Information
CompTIA PenTest+ (PT0-002) Exam
The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.
Exam Overview
The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.
Exam Content
The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.
Who Should Take This Exam?
The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.
How to Prepare
Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.
Summary
The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.
Scroll down to see your responses and detailed results
Free CompTIA PenTest+ PT0-002 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Planning and ScopingInformation Gathering and Vulnerability ScanningAttacks and ExploitsReporting and CommunicationTools and Code Analysis
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
A penetration tester is examining a company's network mapping obtained from a recent scan. The scan reveals multiple subnets with hosts that have both Inter-Subnet and Intra-Subnet communication patterns. Considering the layers of the OSI model, what type of network device is MOST likely responsible for allowing or restricting the communication BETWEEN these subnets?
- You selected this option
Router
- You selected this option
Switch
- You selected this option
Hub
- You selected this option
Firewall without routing capabilities
Answer Description
A router primarily operates at layer 3 (the Network layer) of the OSI model and is designed to connect multiple subnets and direct data packets between them. Routers use IP addresses to make forwarding decisions and can allow or restrict traffic between subnets. In contrast, switches typically operate at layer 2 (Data Link layer) and handle traffic within the same subnet. Hubs, being even more limited, operate at layer 1 (Physical layer) and merely replicate traffic to all ports. Firewalls, though they can restrict traffic between subnets, are not inherently responsible for allowing communication at the network layer but rather for securing the network by applying policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for a router to operate at layer 3 of the OSI model?
How do routers and switches differ in their communication capabilities?
What role do firewalls play in network communication?
During an authorized penetration test, you have discovered an outdated web server software running on a client's production server. Given the nature of the software, it is susceptible to a known remote code execution (RCE) vulnerability that allows an attacker to run arbitrary code on the server. What is the MOST responsible and professional action to take next?
- You selected this option
Run a proof-of-concept to confirm the vulnerability's exploitability before informing the client.
- You selected this option
Exploit the vulnerability to demonstrate the severity to the client without causing any harm to the server.
- You selected this option
Report the vulnerability with details of the affected software, the vulnerability's impact, and suggested remediation steps to the client.
- You selected this option
Ignore the vulnerability since it is the client's responsibility to keep software updated, not the tester's.
Answer Description
When a known vulnerability is identified, the penetration tester's responsibility is to report the vulnerability to the organization in a detailed and timely manner. The report should include the impact of the vulnerability, how it was discovered, and recommended remediation steps. The penetration tester must not exploit the vulnerability without explicit authorization, as doing so can lead to legal issues and would be against the professional code of conduct. Running a proof-of-concept without permission could potentially disrupt the client's operations and would also be unethical. Ignoring the vulnerability fails the client and does not fulfill the tester's obligation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are remote code execution (RCE) vulnerabilities?
What should be included in a vulnerability report?
Why is it important to avoid exploiting vulnerabilities during a penetration test?
Which of the following data types can be found through strategic search engine analysis and might inadvertently reveal internal operational details or personal information when not handled properly by the organization?
- You selected this option
Published company policies
- You selected this option
SSL certificate details
- You selected this option
File metadata
- You selected this option
Social media profiles of employees
Answer Description
File metadata often contains information about the author, organization, document change history, and sometimes even geolocation data. Such metadata can be exposed accidentally by an organization through indexed documents and files on search engines. Strategic search engine analysis can potentially uncover this metadata. SSL certificates and social media profiles do not directly disclose internal operational details as part of their standard information. Company policies are usually general documents and do not contain the sort of specific operational details that metadata might.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is file metadata and why is it important?
How can file metadata be exposed through search engines?
What are the risks associated with exposed file metadata?
As part of an internal security assessment, you are required to scan a network segment that contains older, production-critical systems known for their fragility in terms of network traffic handling. Your objective is to identify vulnerabilities without causing system disruptions. Which scanning method would be most appropriate for this scenario?
- You selected this option
Non-credentialed scan
- You selected this option
Stealth scan
- You selected this option
TCP connect scan
- You selected this option
Credentialed scan
Answer Description
A credentialed scan is the appropriate choice when dealing with fragile systems. This method uses valid access credentials to perform a more in-depth and safer examination of the target systems, reducing the risk of causing disruptions which may occur with more aggressive uncredentialed scans that can overwhelm sensitive systems. A non-credentialed scan can risk causing issues with fragile systems due to the more intrusive nature of the probing. A stealth scan's main purpose is to avoid detection, and while it can be less noisy on the network, it might still cause a fragile system to become unstable. Transmission Control Protocol (TCP) connect scans are more intrusive as they establish a full TCP connection, potentially leading to system instability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of a credentialed scan?
How does a non-credentialed scan differ from a credentialed scan?
What situations would call for using a stealth scan instead?
During an active reconnaissance phase, a penetration tester wants to monitor and capture the interaction between a client application and its server via API calls. What tool or technique would be the best choice to accomplish this task?
- You selected this option
Wardriving tools
- You selected this option
Web proxy
- You selected this option
Anti-virus software
- You selected this option
Port scanner
Answer Description
Using a web proxy is the correct answer because it acts as an intermediary for requests from clients seeking resources from servers. When a client makes an API request, it goes through the proxy, which allows the tester to examine and capture the request and response data. This is critical when analyzing how client and server communicate and identifying potential security issues within the API calls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a web proxy and how does it work?
How do penetration testers use web proxies to identify security issues?
What are some popular web proxy tools used in penetration testing?
During a penetration test, what document specifies the authorized time of day for testing activities and the types of tests that are permitted or prohibited?
- You selected this option
Service-Level Agreement (SLA)
- You selected this option
Rules of Engagement document
- You selected this option
Non-disclosure Agreement (NDA)
- You selected this option
Master Service Agreement
Answer Description
The Rules of Engagement document is essential as it outlines the boundaries and guidelines of the penetration test agreed upon by both the tester and the client. It includes critical details such as the timing of the tests and the specific types of tests that can be performed. This ensures legal compliance and aligns the testing activities with the client's constraints and objectives.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is included in the Rules of Engagement document?
How does the Rules of Engagement document protect both the client and the tester?
What happens if a penetration test goes beyond the established Rules of Engagement?
Antivirus programs solely rely on signature-based detection methods to identify and block penetration testing tools.
- You selected this option
True
- You selected this option
False
Answer Description
The correct answer is false. Modern antivirus programs do not solely rely on signature-based detection. While signature-based detection is a common method that involves matching known malware signatures to files, advanced antivirus solutions also use heuristic analysis, behavioral detection, and anomaly detection to identify malicious activities or files. These methods enable antivirus programs to detect previously unknown threats and the use of penetration testing tools even when they don't match a known signature.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are signature-based detection methods in antivirus programs?
What are some advanced detection methods that antivirus programs use?
What are penetration testing tools, and why might antivirus programs flag them?
Vulnerability scanning tools automatically adjust their scanning techniques based on the detected network topology.
- You selected this option
False
- You selected this option
True
Answer Description
Vulnerability scanning tools cannot automatically adjust their scanning techniques based on the detected network topology. Penetration testers must understand the network topology and manually configure the scanning tools to ensure effective and thorough scanning. This involves selecting the appropriate scanning methods and settings that align with the network's architecture and design in order to minimize the risk of disruption and maximize the detection of potential vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are vulnerability scanning tools?
What is network topology?
Why can't scanning tools automatically adjust to network topology?
Examining metadata from company documents can potentially unveil the software versions used to create them.
- You selected this option
True
- You selected this option
False
Answer Description
File metadata can include details such as the software used to create a document and its version, which could be exploited if the software is known to have vulnerabilities. This information can aid a penetration tester in pinpointing specific software vulnerabilities to target within an organization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is file metadata?
How can vulnerabilities in software versions be exploited?
What is the role of a penetration tester?
The General Data Protection Regulation (GDPR) requires a company to obtain explicit consent from individuals before a penetration tester is allowed to access their personal data during a security assessment.
- You selected this option
False
- You selected this option
True
Answer Description
GDPR imposes strict rules on the processing of personal data of EU residents, including the need for explicit consent for certain actions. However, it does not specifically mandate that a company must obtain explicit consent from individuals before a penetration tester can access their personal data during a security assessment. The necessity for consent depends on the lawful basis for processing the data, and in the context of penetration testing, the lawful basis might be 'compliance with a legal obligation' or 'legitimate interests' of the company to secure its systems. It's important for penetration testers to work with legal counsel to ensure their testing activities are GDPR-compliant.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the lawful bases for processing personal data under GDPR?
What does GDPR stand for and why is it important?
What does explicit consent mean in the context of data protection?
During a penetration testing engagement, you uncover evidence that an employee of the client organization is covertly exfiltrating sensitive customer data. Which of the following actions is the BEST course of action in alignment with professional and ethical standards?
- You selected this option
Wait until the end of the engagement to report the finding in the final report.
- You selected this option
Ignore the finding as it is not within the original scope of the engagement.
- You selected this option
Discuss the situation with fellow team members to decide on a proper course of action.
- You selected this option
Collect more evidence before reporting to make the case stronger.
- You selected this option
Confront the employee directly to deter further data exfiltration.
- You selected this option
Report the finding immediately to the appropriate point of contact within the client organization.
Answer Description
The immediate reporting of the discovered criminal activity to the appropriate point of contact within the client organization is the best course of action because it adheres to professional and ethical standards of conduct, ensuring that potential criminal activity is addressed promptly and through the proper channels. Delaying reporting, confronting the employee directly, or discussing with peers could lead to potential complications, legal issues, or breaches of the scope of engagement and confidentiality agreements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to report findings immediately during a penetration test?
What are some professional and ethical standards for penetration testers?
What should a penetration tester include in their report after discovering unethical behavior?
A client, operating a multinational corporation, requires a penetration test for their network infrastructure. However, due to strict data sovereignty laws, they insist that any discovered data must not leave the country of origin. The penetration test is to be performed remotely from your location in another country. Which of the following approaches would BEST align with the client's data sovereignty restrictions?
- You selected this option
Utilize a jump box located within the client's country to conduct tests and analyze results
- You selected this option
Instantiating a VPN to the client's network to ensure a secure connection for testing
- You selected this option
Limit the scope to include only the testing of public-facing services to avoid data sovereignty complications
- You selected this option
Encrypting all test results to prevent unauthorized access while transmitting data back to your location
Answer Description
The correct answer is 'Utilize a jump box located within the client's country to conduct tests and analyze results,' because it addresses the data sovereignty issue by ensuring that any testing and resulting data remain within the country, adhering to local laws while still allowing the penetration tester to perform their duties from a remote location. Instantiating a VPN would not ensure compliance with data sovereignty as the data might transit through other jurisdictions. Encrypting all test results has merit for securing the data but doesn't prevent data from leaving the country. Testing only public-facing services may still risk violating data sovereignty laws if any resulting data is stored or analyzed outside the target country.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a jump box and how does it work in penetration testing?
What are data sovereignty laws, and why are they important for businesses?
Why is using a VPN not sufficient for complying with data sovereignty laws?
What is the primary goal of utilizing the methodology outlined in the OSSTMM during a penetration testing engagement?
- You selected this option
To facilitate the creation of new security technologies.
- You selected this option
To quantify the financial investment in security controls.
- You selected this option
To establish a comprehensive risk management framework.
- You selected this option
To provide a scientific methodology for the accurate representation of operational security.
Answer Description
The primary goal of using the OSSTMM is to provide a scientific methodology for the accurate representation of operational security. The OSSTMM focuses on testing the operational security of physical locations, networks, and systems to ensure that the testing process is comprehensive and repeatable. This is important because it not only standardizes penetration testing across different environments but also ensures that the results are actionable and reliable. Option B is incorrect because, while risk management is a component of penetration testing, it is not the primary goal of the OSSTMM. Option C is incorrect because this methodology is not primarily about quantifying security spending. Option D is incorrect as its primary goal is not the generation of new security technologies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does OSSTMM stand for?
What are the components of operational security tested by OSSTMM?
Why is standardization in penetration testing important?
During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?
- You selected this option
Run the scan during peak business hours to blend in with regular traffic.
- You selected this option
Use an aggressive scanning method to finish the scan more quickly.
- You selected this option
Throttle the scan speed to use minimal bandwidth and prevent network congestion.
- You selected this option
Scan without credentials to reduce the amount of data transferred.
Answer Description
Reducing the speed at which the scan is carried out (Throttling the scan speed) is the best approach when dealing with bandwidth limitations. It ensures that the vulnerability scan does not consume excessive bandwidth, which could slow down the network for legitimate users or cause disruptions. It also helps avoid triggering alarms that could alert network administrators to the scan's presence. Although performing the scan during off-peak hours or using less intrusive scan types may help, they do not directly address the problem of limited bandwidth as effectively as actively managing the scan's bandwidth usage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to throttle scan speed?
Why is running a scan during peak hours not a good idea?
What are some aggressive scanning methods?
During a vulnerability assessment, you identify several devices on the network, including switches, routers, and firewalls. What method should you employ to comprehensively identify potential vulnerabilities on these network devices while minimizing risks to their operational stability?
- You selected this option
Stealth scan
- You selected this option
Non-credentialed scan
- You selected this option
Credentialed scan
- You selected this option
TCP connect scan
Answer Description
The correct answer is 'Credentialed scan'. Performing credentialed scans on network devices enables deeper visibility into their configurations and potential vulnerabilities without causing the disruptions often associated with non-credentialed scans. These scans can access logs, configurations, and other details that are not available to a non-credentialed scan while reducing the chance of causing issues to the device's stability. Credentialed scans are considered best practices when allowed and possible on devices as they provide the most thorough results with fewer false positives and less operational risk to the devices being scanned.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a credentialed scan and how is it different from a non-credentialed scan?
Why are credentialed scans considered best practices in vulnerability assessments?
What kinds of vulnerabilities can a credentialed scan help identify?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.