CompTIA PenTest+ Practice Test (PT0-002)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-002). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-002 Information
CompTIA PenTest+ (PT0-002) Exam
The CompTIA PenTest+ (PT0-002) certification is designed for cybersecurity professionals who specialize in penetration testing and vulnerability assessment. It validates hands-on skills in planning, conducting, and reporting penetration tests for organizations. This certification is vendor-neutral and focuses on real-world scenarios, making it relevant for security professionals working with various technologies and environments.
Exam Overview
The PT0-002 exam consists of a maximum of 85 questions, including multiple-choice and performance-based questions. Candidates have 165 minutes to complete the test. The exam costs $392 USD. A passing score is 750 on a scale of 100 to 900. The certification is valid for three years and can be renewed through CompTIA’s continuing education program.
Exam Content
The PT0-002 exam covers five main domains: planning and scoping, information gathering and vulnerability scanning, attacks and exploits, reporting and communication, and tools and code analysis. Planning and scoping include engagement rules, compliance, and risk assessment. Information gathering and vulnerability scanning focus on reconnaissance, fingerprinting, and scanning techniques. Attacks and exploits test knowledge of network, web, wireless, and physical attacks. Reporting and communication cover documentation, remediation, and risk communication. Tools and code analysis assess scripting, automation, and exploit development.
Who Should Take This Exam?
The CompTIA PenTest+ certification is ideal for cybersecurity professionals working as penetration testers, security analysts, vulnerability assessment analysts, or red team members. It is recommended for individuals with at least three to four years of hands-on cybersecurity experience. The certification is also useful for IT professionals who want to advance their careers in offensive security.
How to Prepare
Candidates should review the official CompTIA PenTest+ Exam Objectives and study materials provided by CompTIA. Practical experience with penetration testing tools such as Metasploit, Nmap, and Burp Suite is essential. Practice exams can help assess readiness and identify weak areas. Hands-on labs and ethical hacking courses can further strengthen skills.
Summary
The CompTIA PenTest+ (PT0-002) certification is a valuable credential for cybersecurity professionals specializing in penetration testing and vulnerability assessment. It validates hands-on skills in ethical hacking, exploit development, and security testing. This certification is ideal for those pursuing careers in offensive security and ethical hacking.
Scroll down to see your responses and detailed results
Free CompTIA PenTest+ PT0-002 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Planning and ScopingInformation Gathering and Vulnerability ScanningAttacks and ExploitsReporting and CommunicationTools and Code Analysis
A penetration tester is assessing a manufacturing company's network infrastructure that uses industrial control systems. They are particularly focused on identifying weaknesses that could be exploited in these systems to cause operational disruption. Which type of system is most likely being targeted for this evaluation?
- You selected this option
Supervisory control and data acquisition (SCADA) systems
- You selected this option
Enterprise data processing systems
- You selected this option
Industrial control systems (ICS)
- You selected this option
Personal IoT devices
Answer Description
Industrial control systems (ICS) are used in environments like manufacturing to monitor and control industrial processes. They are commonly subject to operational disruption due to attacks on their vulnerabilities. Although SCADA and IIoT systems may also be involved in controlling industrial processes, the question specifically addresses 'systems' in general which pertains to ICS. SCADA is typically a subset of ICS used for centralized monitoring and control, while IIoT refers to the interconnected sensors, instruments, and other devices networked together with industrial processes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Industrial Control Systems (ICS)?
What is a SCADA system and how does it relate to ICS?
Why are ICS often targeted for vulnerabilities?
What is the primary purpose of the tool Nessus in the context of penetration testing?
- You selected this option
To configure and manage network firewalls.
- You selected this option
For real-time intrusion detection and prevention.
- You selected this option
To scan networks and systems for potential vulnerabilities.
- You selected this option
To analyze network traffic for anomalies.
Answer Description
Nessus is primarily used for scanning and assessing networks to find vulnerabilities that could be exploited. It does not directly provide intrusion detection capabilities, network traffic analysis, or firewall configuration, which makes the correct answer stand out as it is the key functionality of Nessus in the penetration testing process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Nessus identify vulnerabilities in a network?
What types of vulnerabilities can Nessus scan for?
Is Nessus suitable for both small and large networks?
During an engagement, a penetration tester has captured several hashed passwords suspected to be using the MD5 hashing algorithm. They need to perform a time-optimized attack to attempt to reveal the plaintext passwords. Which tool should they prioritize for the fastest hash cracking of MD5, particularly when leveraging GPU acceleration?
- You selected this option
CeWL
- You selected this option
Cain
- You selected this option
Hashcat
- You selected this option
John the Ripper
Answer Description
Although all options are credential testing tools, Hashcat is designed for optimized performance on both CPUs and GPUs and is highly effective for cracking various types of hashes, including MD5. Its GPU acceleration capabilities significantly reduce the time required to crack hashes. John the Ripper also supports hash cracking but is typically outperformed by Hashcat when GPU resources are utilized. Cain is generally used for network sniffing and password recovery but is not as versatile as Hashcat for hash cracking. CeWL is actually a custom word list generator tool and not a hash cracking tool, so it does not apply to the direct cracking of hashes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes Hashcat better for cracking MD5 hashes compared to other tools?
What are the potential risks of using MD5 for password hashing?
How does GPU acceleration enhance the performance of hash cracking tools like Hashcat?
During an internal security assessment, a penetration tester needs to identify live hosts without performing a full port scan, to reduce network congestion. Which of the following Nmap options would be most appropriate for the tester to use to simply ping the hosts?
- You selected this option
-sn
- You selected this option
-sV
- You selected this option
-A
- You selected this option
-p
Answer Description
The '-sn' option in Nmap is used to perform a host discovery, which simply pings the hosts without actually scanning any ports. This is the correct answer as it minimizes the amount of traffic and reduces the chance of causing network disruption. The '-sV' option executes a service version detection, which is more intrusive and creates more traffic, going beyond the requirement of just discovering live hosts. The '-A' option enables OS detection, version detection, script scanning, and traceroute, which would not only produce more traffic but also try to scan and fingerprint hosts, which is not needed in this scenario. The '-p' option specifies the target ports to scan, which does not directly relate to host discovery without port scanning.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Nmap and what are its primary uses?
What does the '-sn' option do in Nmap?
Why is minimizing network traffic important during a security assessment?
You are preparing for a penetration test within a European Union country that has strict privacy laws. Due to the nature of the test, you need to use packet sniffing tools to analyze network traffic. Which of the following actions is most appropriate according to tool restriction considerations?
- You selected this option
Request written authorization from the client specifically allowing the use of packet sniffing tools during the penetration test.
- You selected this option
Proceed with using packet sniffing tools without client notification, since you are conducting a penetration test to enhance security.
- You selected this option
Use packet sniffing tools only during off-hours to minimize the impact on the client’s network and reduce the risk of violating privacy laws.
- You selected this option
Exclude the use of packet sniffing tools from the penetration test to avoid any conflict with the local privacy laws.
Answer Description
Requesting written authorization from the client for using specific tools, like packet sniffers, is essential, especially where privacy laws are stringent, such as in the European Union under the GDPR. This written authorization helps ensure that you have explicit permission to use techniques that may intercept or process personal data and protects both you and the client from legal repercussions. The other options do not offer the same level of legal protection or adherence to privacy laws, and using tools without consideration of local laws or client permission can lead to serious legal consequences.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is GDPR and why is it important in penetration testing?
What are packet sniffing tools and how are they used in penetration testing?
What are the potential legal consequences of not having authorization for using packet sniffing tools?
A penetration tester is reviewing the Statement of Work (SOW) before starting an engagement with a new client. The SOW outlines the objectives, deliverables, timelines, and milestones for the penetration test. Which of the following would MOST likely be specified in the SOW to define the extent of the penetration test?
- You selected this option
Service performance metrics that the penetration testing team must adhere to, as per the previously defined service-level agreement (SLA).
- You selected this option
The types of attacks the penetration tester is authorized to perform, such as social engineering or network scanning.
- You selected this option
The confidentiality agreements outlined in the non-disclosure agreement (NDA) prepared separately by legal teams.
- You selected this option
The risk assessment report template to be used for presenting findings to the client post engagement.
Answer Description
The SOW includes details of the tasks and responsibilities of the penetration testing team. Specifying the types of attacks allowed (e.g., social engineering, network scanning, etc.) is important to ensure both the client and the penetration tester understand the boundaries and methodologies that can be employed during the test. Conversely, an NDA relates to confidentiality agreements, an SLA to service performance metrics, and a risk assessment report to findings after an engagement, rather than the pre-defined tasks of the penetration test itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the typical types of attacks specified in a SOW for penetration testing?
Why is it important to specify attack types in the SOW?
What is the significance of distinguishing between SOW, NDA, and SLA in a penetration testing context?
During a penetration test, who should you primarily reach out to for discussing specific technical details of the vulnerabilities found?
- You selected this option
C-suite executive
- You selected this option
Technical contact
- You selected this option
Third-party stakeholder
- You selected this option
Emergency contact
Answer Description
The technical contact is the individual within the client organization who possesses the detailed technical knowledge required to understand and act upon the technical aspects of the findings in a penetration test. Other options may have roles in the process, but the technical contact is the go-to for vulnerability discussions, making Answer A correct.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What role does a technical contact play during a penetration test?
What qualifications or skills should a technical contact have?
Why are C-suite executives or emergency contacts not appropriate for discussing technical findings?
Which of the following attacks involves an adversary impersonating another device or user on a network to steal data, intercept communications, or spread malware?
- You selected this option
ARP poisoning
- You selected this option
Masquerading
- You selected this option
Spoofing
- You selected this option
DNS cache poisoning
Answer Description
Spoofing is an attack method where the attacker masquerades as a legitimate device or user to gain unauthorized access to resources, intercept communications, or distribute malware. This is central to understanding many cybersecurity threats and is a fundamental concept within the realm of penetration testing. ARP poisoning and DNS cache poisoning are specific techniques where spoofing is utilized, but they are not synonymous with spoofing in the broader sense. Masquerading is not typically used as a technical term in the context of security attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common types of spoofing attacks?
How do cybersecurity professionals prevent spoofing attacks?
What is the role of ARP in spoofing attacks?
What practice should a penetration tester implement to uphold the security principle of confidentiality when handling data acquired during an engagement?
- You selected this option
Encrypt all sensitive data acquired during testing and use responsible discretion when handling this information.
- You selected this option
Regularly post updates on social media platforms to establish transparency with the security community.
- You selected this option
Discuss project details with peers in public areas to obtain their input on potential findings.
- You selected this option
Leave computers with sensitive data unlocked when not in use to enable efficient access for authorized team members.
Answer Description
Using responsible discretion when handling the data refers to being cautious about how and where the data is stored, who has access to it, and ensuring that it is not disclosed to unauthorized parties. This is the core principle of maintaining the confidentiality of data. Encrypting the data provides an additional layer of security by rendering the data unreadable should it fall into the wrong hands, which adheres to the practice of maintaining confidentiality. Discussing project details in public undermines confidentiality, as it can lead to unauthorized disclosure of sensitive information. Failing to lock computers leaves data exposed to unauthorized access, also breaching confidentiality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data encryption and why is it important for confidentiality?
What are some best practices for responsibly handling sensitive data?
What are the potential consequences of failing to maintain confidentiality?
What is the primary purpose of including screenshots within the report documentation of a penetration test?
- You selected this option
To enhance the aesthetic appeal of the report
- You selected this option
To illustrate step-by-step process of the penetration testing tools used
- You selected this option
To provide visual evidence and support the reproduction of issues
- You selected this option
To educate the client on how to use different penetration testing tools
Answer Description
Screenshots provide visual evidence of the findings and support the reproduction of the issues by the technical staff, making them a crucial aspect of ongoing documentation during a penetration test. While they may also assist in illustrating process steps or educating clients on the use of tools, these are not considered the primary purposes for including them in the report documentation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is visual evidence important in a penetration test report?
How do screenshots help with the reproduction of issues?
Are there any best practices for including screenshots in a report?
What is the primary purpose of performing a deauthentication attack in a wireless network security analysis?
- You selected this option
To increase the signal strength of a wireless access point
- You selected this option
To disconnect clients from a wireless network
- You selected this option
To encrypt the communication between a client and the wireless access point
- You selected this option
To provide a client with unauthorized access to network resources
Answer Description
A deauthentication attack is primarily used to forcibly disconnect clients from a wireless network. This could allow an attacker to capture the handshake when the client reauthenticates, which is essential for cracking the wireless password. This type of attack disrupts the normal operation and communication by sending deauthentication frames from an access point to the client or vice versa.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are deauthentication frames?
Why is capturing the handshake important in a deauthentication attack?
What are the ethical implications of performing a deauthentication attack?
During a penetration test for ABC Corp, you identified that the password policy allows users to set extremely common passwords and does not enforce password complexity. As part of your report to the company's management, which of the following recommendations would be MOST appropriate to address this vulnerability?
- You selected this option
Advise the company to eliminate passwords entirely in favor of a physical token-based system.
- You selected this option
Enforce password complexity requirements within the organization's password policy.
- You selected this option
Increase the frequency of security monitoring to catch potential breaches.
- You selected this option
Limit the number of login attempts to three before locking out the user account.
- You selected this option
Implement an account expiration policy that forces users to re-register every 90 days.
- You selected this option
Encourage the use of biometric authentication for all users to replace passwords.
Answer Description
To mitigate the risk of weak passwords being exploited, it is recommended that password policies enforce criteria for complexity (e.g., uppercase, lowercase, numbers, and special characters). This recommendation is appropriate because it directly addresses the identified weakness in the company's password policy by suggesting a standard best practice for password management. Other options, like increasing monitoring or encouraging biometric use, may also contribute to security but do not directly address the core issue of password weaknesses as effectively as enforcing password complexity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are password complexity requirements?
Why is enforcing password complexity important for security?
What are some best practices for creating strong passwords?
During a penetration test, you're tasked with automating the process of scanning a network to identify live hosts and then perform a vulnerability scan on the discovered hosts. Which of the following scripting approaches allows you to meet the requirement while adhering to best practices for efficient and effective test automation?
- You selected this option
Manually logging the IP addresses of live hosts and then using a seperate tool to scan each IP address for vulnerabilities.
- You selected this option
Using a script that incorporates an initial ping sweep to identify live hosts and then dynamically passing the list of live IP addresses to a vulnerability scanner
- You selected this option
Performing a vulnerability scan using random sampling of IP addresses in the network to predict the presence of live hosts.
- You selected this option
Running a full vulnerability scan on the entire IP range of the network without performing host discovery.
Answer Description
The correct answer is 'Using a script that incorporates an initial ping sweep to identify live hosts and then dynamically passing the list of live IP addresses to a vulnerability scanner'. This process is efficient as it first narrows down the list of targets to active hosts and then applies a more resource-intensive vulnerability scan solely to those hosts, rather than wasting resources on scanning potentially down or non-existent systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a ping sweep and how does it work?
What is a vulnerability scanner, and how does it work?
Why is it important to adhere to best practices in test automation during penetration testing?
During a penetration test, why is it important to have predefined communication triggers?
- You selected this option
To solely document test methodologies and not the findings
- You selected this option
To decrease the frequency of status reports and streamline the report generation process
- You selected this option
To minimize communication with the client and avoid information overload
- You selected this option
To ensure stakeholders are promptly informed about critical findings and facilitate immediate action
Answer Description
Predefined communication triggers are important because they establish clear guidelines for when the penetration testing team should communicate with stakeholders. These triggers ensure that critical information, such as high severity vulnerabilities or indicators of a prior compromise, is relayed immediately to maintain situational awareness and address potential risks efficiently. Without these triggers, important information might be delayed or overlooked, compromising the value and effectiveness of the test.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are communication triggers in a penetration test?
Why is it critical to inform stakeholders immediately about certain vulnerabilities?
How does having predefined communication triggers affect the penetration testing process?
During a penetration test, you discover an unauthenticated remote code execution vulnerability in a client's primary web application. This application contains sensitive customer data. How should this finding be classified in terms of severity when promptly communicating it to the client?
- You selected this option
Low
- You selected this option
Medium
- You selected this option
Critical
- You selected this option
High
Answer Description
An unauthenticated remote code execution vulnerability is usually considered a critical finding because it allows an attacker to gain control over the system without needing credentials, leading to potentially severe impacts on confidentiality, integrity, and availability. Since sensitive customer data is at stake, the severity and potential business impact are high, necessitating immediate attention and remediation efforts. That's why it's classified as critical and should be communicated to the client as such.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an unauthenticated remote code execution vulnerability?
Why is this finding classified as critical?
What are the potential impacts of a critical vulnerability like this?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.