00:15:00

CompTIA PenTest+ Practice Test (PT0-002)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-002
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-002 Information

CompTIA PenTest+ (PT0-002) Exam

The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.

Exam Overview

The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.

Exam Content

The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.

Who Should Take This Exam?

The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.

How to Prepare

Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.

Summary

The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.

Free CompTIA PenTest+ PT0-002 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Planning and Scoping
    Information Gathering and Vulnerability Scanning
    Attacks and Exploits
    Reporting and Communication
    Tools and Code Analysis
Question 1 of 15

A penetration tester is assessing a manufacturing company's network infrastructure that uses industrial control systems. They are particularly focused on identifying weaknesses that could be exploited in these systems to cause operational disruption. Which type of system is most likely being targeted for this evaluation?

  • You selected this option

    Supervisory control and data acquisition (SCADA) systems

  • You selected this option

    Enterprise data processing systems

  • You selected this option

    Industrial control systems (ICS)

  • You selected this option

    Personal IoT devices

Question 2 of 15

What is the primary purpose of the tool Nessus in the context of penetration testing?

  • You selected this option

    To configure and manage network firewalls.

  • You selected this option

    For real-time intrusion detection and prevention.

  • You selected this option

    To scan networks and systems for potential vulnerabilities.

  • You selected this option

    To analyze network traffic for anomalies.

Question 3 of 15

During an engagement, a penetration tester has captured several hashed passwords suspected to be using the MD5 hashing algorithm. They need to perform a time-optimized attack to attempt to reveal the plaintext passwords. Which tool should they prioritize for the fastest hash cracking of MD5, particularly when leveraging GPU acceleration?

  • You selected this option

    CeWL

  • You selected this option

    Cain

  • You selected this option

    Hashcat

  • You selected this option

    John the Ripper

Question 4 of 15

During an internal security assessment, a penetration tester needs to identify live hosts without performing a full port scan, to reduce network congestion. Which of the following Nmap options would be most appropriate for the tester to use to simply ping the hosts?

  • You selected this option

    -sn

  • You selected this option

    -sV

  • You selected this option

    -A

  • You selected this option

    -p

Question 5 of 15

You are preparing for a penetration test within a European Union country that has strict privacy laws. Due to the nature of the test, you need to use packet sniffing tools to analyze network traffic. Which of the following actions is most appropriate according to tool restriction considerations?

  • You selected this option

    Request written authorization from the client specifically allowing the use of packet sniffing tools during the penetration test.

  • You selected this option

    Proceed with using packet sniffing tools without client notification, since you are conducting a penetration test to enhance security.

  • You selected this option

    Use packet sniffing tools only during off-hours to minimize the impact on the client’s network and reduce the risk of violating privacy laws.

  • You selected this option

    Exclude the use of packet sniffing tools from the penetration test to avoid any conflict with the local privacy laws.

Question 6 of 15

A penetration tester is reviewing the Statement of Work (SOW) before starting an engagement with a new client. The SOW outlines the objectives, deliverables, timelines, and milestones for the penetration test. Which of the following would MOST likely be specified in the SOW to define the extent of the penetration test?

  • You selected this option

    Service performance metrics that the penetration testing team must adhere to, as per the previously defined service-level agreement (SLA).

  • You selected this option

    The types of attacks the penetration tester is authorized to perform, such as social engineering or network scanning.

  • You selected this option

    The confidentiality agreements outlined in the non-disclosure agreement (NDA) prepared separately by legal teams.

  • You selected this option

    The risk assessment report template to be used for presenting findings to the client post engagement.

Question 7 of 15

During a penetration test, who should you primarily reach out to for discussing specific technical details of the vulnerabilities found?

  • You selected this option

    C-suite executive

  • You selected this option

    Technical contact

  • You selected this option

    Third-party stakeholder

  • You selected this option

    Emergency contact

Question 8 of 15

Which of the following attacks involves an adversary impersonating another device or user on a network to steal data, intercept communications, or spread malware?

  • You selected this option

    ARP poisoning

  • You selected this option

    Masquerading

  • You selected this option

    Spoofing

  • You selected this option

    DNS cache poisoning

Question 9 of 15

What practice should a penetration tester implement to uphold the security principle of confidentiality when handling data acquired during an engagement?

  • You selected this option

    Encrypt all sensitive data acquired during testing and use responsible discretion when handling this information.

  • You selected this option

    Regularly post updates on social media platforms to establish transparency with the security community.

  • You selected this option

    Discuss project details with peers in public areas to obtain their input on potential findings.

  • You selected this option

    Leave computers with sensitive data unlocked when not in use to enable efficient access for authorized team members.

Question 10 of 15

What is the primary purpose of including screenshots within the report documentation of a penetration test?

  • You selected this option

    To enhance the aesthetic appeal of the report

  • You selected this option

    To illustrate step-by-step process of the penetration testing tools used

  • You selected this option

    To provide visual evidence and support the reproduction of issues

  • You selected this option

    To educate the client on how to use different penetration testing tools

Question 11 of 15

What is the primary purpose of performing a deauthentication attack in a wireless network security analysis?

  • You selected this option

    To increase the signal strength of a wireless access point

  • You selected this option

    To disconnect clients from a wireless network

  • You selected this option

    To encrypt the communication between a client and the wireless access point

  • You selected this option

    To provide a client with unauthorized access to network resources

Question 12 of 15

During a penetration test for ABC Corp, you identified that the password policy allows users to set extremely common passwords and does not enforce password complexity. As part of your report to the company's management, which of the following recommendations would be MOST appropriate to address this vulnerability?

  • You selected this option

    Advise the company to eliminate passwords entirely in favor of a physical token-based system.

  • You selected this option

    Enforce password complexity requirements within the organization's password policy.

  • You selected this option

    Increase the frequency of security monitoring to catch potential breaches.

  • You selected this option

    Limit the number of login attempts to three before locking out the user account.

  • You selected this option

    Implement an account expiration policy that forces users to re-register every 90 days.

  • You selected this option

    Encourage the use of biometric authentication for all users to replace passwords.

Question 13 of 15

During a penetration test, you're tasked with automating the process of scanning a network to identify live hosts and then perform a vulnerability scan on the discovered hosts. Which of the following scripting approaches allows you to meet the requirement while adhering to best practices for efficient and effective test automation?

  • You selected this option

    Manually logging the IP addresses of live hosts and then using a seperate tool to scan each IP address for vulnerabilities.

  • You selected this option

    Using a script that incorporates an initial ping sweep to identify live hosts and then dynamically passing the list of live IP addresses to a vulnerability scanner

  • You selected this option

    Performing a vulnerability scan using random sampling of IP addresses in the network to predict the presence of live hosts.

  • You selected this option

    Running a full vulnerability scan on the entire IP range of the network without performing host discovery.

Question 14 of 15

During a penetration test, why is it important to have predefined communication triggers?

  • You selected this option

    To solely document test methodologies and not the findings

  • You selected this option

    To decrease the frequency of status reports and streamline the report generation process

  • You selected this option

    To minimize communication with the client and avoid information overload

  • You selected this option

    To ensure stakeholders are promptly informed about critical findings and facilitate immediate action

Question 15 of 15

During a penetration test, you discover an unauthenticated remote code execution vulnerability in a client's primary web application. This application contains sensitive customer data. How should this finding be classified in terms of severity when promptly communicating it to the client?

  • You selected this option

    Low

  • You selected this option

    Medium

  • You selected this option

    Critical

  • You selected this option

    High