CompTIA PenTest+ (PT0-002) Sample Questions - Testprep Training Tutorials (2023)

CompTIA PenTest+ (PT0-002) Sample Questions - Testprep Training Tutorials (1)

The CompTIA PenTest+ (PT0-002) is for cybersecurity experts entrusted with penetration testing and weakness the board. It is the most thorough test covering all infiltration testing stages. The CompTIA PenTest+ (PT0-002) test surveys the most state-of-the-art entrance testing, and weakness appraisal and the management skills are important to decide the versatility of the network against attacks. To successfully pass the test, the candidate should possess an excellent command of the following domains-

  • Domain 1 – An overview of Planning and Scoping
  • Domain 2 – A proper understanding of Information Gathering and Vulnerability Scanning
  • Domain 3 – An overview of Attacks and Exploits
  • Domain 4 -An overview of Reporting and Communication
  • Domain 5 – Detailed understanding of Tools and Code Analysis

Here are some of the most important sample questions that will help you achieve a better understanding of all the domains.

Advanced Sample Questions

What is the primary purpose of penetration testing?

  • a) To identify and exploit vulnerabilities in a target system or network.
  • b) To improve the overall security posture of a target system or network.
  • c) To secure a target system or network against future attacks.
  • d) All of the above.

Answer: b) To improve the overall security posture of a target system or network.

Which of the following is NOT an ethical hacking tool?

  • a) Metasploit
  • b) Wireshark
  • c) Nmap
  • d) Backdoor

Answer: d) Backdoor

What is the primary goal of social engineering attacks?

  • a) To gain unauthorized access to a target system or network.
  • b) To steal sensitive information from a target.
  • c) To disrupt the normal operations of a target.
  • d) All of the above.

Answer: b) To steal sensitive information from a target.

Which of the following is a commonly used technique for discovering vulnerabilities in a target system or network?

  • a) Vulnerability scanning
  • b) Port scanning
  • c) Traffic analysis
  • d) All of the above.

Answer: a) Vulnerability scanning

What is the first step in the ethical hacking process?

  • a) Information gathering
  • b) Vulnerability analysis
  • c) Exploitation
  • d) Report writing

Answer: a) Information gathering

What is a vulnerability assessment?

  • a) A comprehensive evaluation of the security of a target system or network.
  • b) A focused examination of specific aspects of a target system or network.
  • c) An attempt to exploit vulnerabilities in a target system or network.
  • d) A review of security documentation for a target system or network.

Answer: b) A focused examination of specific aspects of a target system or network.

What is the purpose of a threat model?

  • a) To identify and prioritize potential threats to a target system or network.
  • b) To understand the motivations and tactics of attackers.
  • c) To determine the most effective countermeasures for a target system or network.
  • d) All of the above.

Answer: a) To identify and prioritize potential threats to a target system or network.

Which of the following is a commonly used tool for password cracking?

  • a) John the Ripper
  • b) Metasploit
  • c) Nessus
  • d) Aircrack-ng

Answer: a) John the Ripper

What is the difference between a false positive and a false negative in the context of vulnerability assessments?

  • a) A false positive is a reported vulnerability that does not actually exist, while a false negative is a missed vulnerability.
  • b) A false positive is a missed vulnerability, while a false negative is a reported vulnerability that does not actually exist.
  • c) A false positive is a reported vulnerability that is actually a feature, while a false negative is a missed vulnerability that is actually a feature.

Answer: a) A false positive is a reported vulnerability that does not actually exist, while a false negative is a missed vulnerability.

(Video) CompTIA PenTest+ Full Course - FREE [11 Hours] PT0-002

What is the purpose of post-exploitation activities in a penetration test?

  • a) To further compromise the target system or network.
  • b) To gather additional information about the target system or network.
  • c) To clean up after the penetration test.
  • d) All of the above.

Answer: b) To gather additional information about the target system or network.

Basic Sample Questions

CompTIA PenTest+ (PT0-002) Sample Questions - Testprep Training Tutorials (2)
1.) A client needs a security evaluation organization to play out an entrance test against its hot site. The motivation behind the test is to decide the adequacy of the safeguards that safeguard against interruptions to business coherence. Which of coming up next is the MOST significant move to make prior to beginning this sort of evaluation?

A. Guarantee the client has marked the SOW.
B. Confirm the client has conceded network admittance to the hot site.
C. Decide whether the failover climate depends on assets not claimed by the client.
D. Layout correspondence and acceleration systems with the client.

Right Answer: A

2.) Playing out a penetration test against a climate with SCADA gadgets brings additional safety risks since they:

A. gadgets produce more intensity and consume more power.
B. gadgets are outdated and are at this point not accessible for substitution.
C. conventions are more challenging to comprehend.
D. gadgets might cause actual world impacts.

Right Answer: D

Explanation: Vulnerability Analysis of Network Scanning on SCADA Systems

3.) Which of the accompanying reports depicts explicit exercises, expectations, and timetables for a penetration tester in CompTIA PenTest+?

A. NDA
B. MSA
C. SOW
D. MOU

Right Answer: C

4.) An organization employed an entrance testing group to survey the digital actual frameworks in an assembling plant. The group promptly found the administrative frameworks and PLCs are both associate with the organization’s intranet. Which of the accompanying suspicions, whenever made by the infiltration testing group, is MOST prone to be legitimate?

A. PLCs won’t follow up on orders infused over the organization.
B. The supervisors & controllers are in a different virtual network by default
C. Controllers won’t approve the beginning of orders.
D. The supervisory system will identify a malevolent infusion of code/orders.

Right Answer: C

5.) A penetration tester was used to run a ping ‘” An order during an obscure climate test, and it returned a 128 TTL packet. Which of the accompanying OSs could MOST probable return a packet of this sort?

A. Windows
B. Apple
C. Linux
D. Android

Right Answer: A

(Video) CompTIA Pentest+ Practice Test

Explanation: How to Identify Basic Internet Problems with the Ping Command

6.) A penetration tester who is doing an organization-mentioned evaluation might want to send traffic to another framework utilizing double tagging. Which of the accompanying methods could BEST achieve this objective?

A. RFID cloning
B. RFID tagging
C. Meta tagging
D. Tag nesting

Right Answer: D

7.) An organization enlisted a penetration tester to design wireless IDS over the network. Which of the accompanying devices would BEST test the viability of the wireless IDS solutions in CompTIA PenTest+?

A. Aircrack-ng
B. Wireshark
C. Wifite
D. Kismet

Right Answer: A

Explanation: How To Perform A Wireless Penetration Test

8.) A penetration tester accesses a framework and lays out constancy, and afterward runs the accompanying orders: feline/dev/invalid > temp contact ‘”r .bash_history temp mv temp .bash_history
Which of the accompanying activities is the analyzer MOST probable performing?

A. Diverting Bash history to/dev/invalid
B. Making a duplicate of the client’s Bash history for an additional enumeration
C. Covering tracks by clearing the Bash history
D. Making decoy files on the system to confound incident responders

Right Answer: C

Explanation: How to clear the Logs & Bash History on Hacked Linux Systems to Cover Your Tracks & Remain Undetected

9.) Which of the accompanying should a penetration tester do NEXT in the wake of recognizing that an application being tried has proactively been compromised with malware?

A. Analyzing the malware to see what it does.
B. Gather the appropriate proof and afterward eliminate the malware.
C. Do an underlying driver examination to figure out how the malware got in.
D. Eliminate the malware right away.
E. Stop the evaluation and illuminate the crisis contact.

Right Answer: D

Explanation: If a company has been hack, what to do?

(Video) #CompTIA Pentest+ exam | How I passed

10.) A penetration tester runs the accompanying order on a framework:
find/ – client root ‘”perm – 4000 ‘”print 2>/dev/invalid
Which of coming up next is the analyzer attempting to achieve?

A. Set the SGID on all records in the/catalog
B. View as the/root catalog on the framework
C. Find records with the SUID bit set Most Voted
D. Find documents that were made during abuse and move them to/dev/invalid

Right Answer: C

Explanation: Find command in Linux

11.) Which of the accompanying could MOST possible be remember for the last report of a static application-security test that was compose with a group of use designers as the target group?

A. Chief synopsis of the infiltration testing techniques utilized
B. Bill of materials including supplies, subcontracts, and costs brought about during the appraisal
C. Quantitative effect evaluations are given fruitful programming split the difference
D. Code setting for examples of dangerous kind projecting activities

Right Answer: D

12.) Which of the accompanying apparatuses gives Python classes to connect with network conventions?

A. Responder
B. Impacket
C. Empire
D. PowerSploit

Right Answer: B

Explanation: Impacket

13.) A penetration tester has gotten shell admittance to a Windows host and needs to run an extraordinarily create twofold for later execution utilizing the wmic.exe cycle call make capability. Which of the accompanying OS or filesystem systems is MOST prone to help this goal?

A. Substitute information streams
B. PowerShell modules
C. MP4 steganography
D. PsExec

Right Answer: D

14.) A penetration tester finds during a new test that a worker in the bookkeeping office has been making changes to an installment framework and diverting cash into an individual ledger. The entrance test was quickly halt. Which of the accompanying could be the BEST proposal to forestall this kind of movement later on?

A. Authorize obligatory worker get-aways
B. Carry out multifaceted confirmation
C. Introduce video observation gear in the workplace
D. Scramble passwords for financial balance data

Right Answer: B

(Video) CompTIA PenTest+ (PT0-001) Video Series with Michael Solomon

15.) A penetration tester needs to filter an objective organization without being identify by the client’s IDS. Which of the accompanying sweeps is MOST liable to stay away from discovery?

A. nmap ג€”p0 ג€” T0 ג€” sS 192.168.1.10 Most Voted
B. nmap ג€”sA ג€”sV – – have break 60 192.168.1.10
C. nmap ג€”f – – badsum 192.168.1.10
D. nmap ג€”A ג€”n 192.168.1.10

Right Answer: A

16.) A penetration tester has distinguished a few recently delivered CVEs on a VoIP call director. The checking apparatus the analyzer utilized decided the conceivable presence of the CVEs in light of the form number of the help. Which of the accompanying strategies could BEST help approval of the potential discoveries?

A. Physically check the variant number of the VoIP administration against the CVE discharge
B. Test with evidence of idea code from an adventure data set
C. Audit SIP traffic from an on-way position to search for signs of giving and take
D. Use a Nmap ג€”SV check against the assistance

Right Answer: D

17.) A penetration tester is checking a corporate lab network for possibly weak administrations. Which of the accompanying Nmap orders will return weak ports that may be intriguing to an expected aggressor in CompTIA PenTest+?

A. nmap 192.168.1.1-5 ג€” PU22-25,80
B. nmap 192.168.1.1-5 ג€”PA22-25,80
C. nmap 192.168.1.1-5 ג€”PS22-25,80
D. nmap 192.168.1.1-5 ג€”Ss22-25,80

Right Answer: C

18.) A software development group is worried that another item’s 64-cycle Windows pairs can be dismantle to the basic code. Which of the accompanying devices could an entrance analyzer at any point use to assist the group with measuring what an aggressor could find in the doubles in CompTIA PenTest+?

A. Immunity Debugger
B. OllyDbg
C. GDB
D. Drozer

Right Answer: B

19.) A mail administration organization has recruited an entrance analyzer to direct a specification of all client accounts on an SMTP server to recognize whether past staff part accounts are as yet dynamic. Which of the accompanying orders ought to be utilize to achieve the objective?

A. VRFY and EXPN
B. VRFY and TURN
C. EXPN and TURN
D. RCPT TO and VRFY

Right Answer: A

Explanation: SMTP

20.) A penetration tester was leading a penetration test and found the organization traffic was done arriving at the client’s IP address. The analyzer later found the SOC had utilized sinkholing on the infiltration analyzer’s IP address. Which of the accompanying BEST depicts what was the deal?

A. The penetration tester was trying some unacceptable resources
B. The arranging system neglect to guarantee all groups were inform
C. The client was not prepare for the appraisal to begin
D. The penetration tester had erroneous contact data

(Video) CompTIA Pentest+ (PT0-001): Complete Course & Practice Exam

Right Answer: B

FAQs

Is the CompTIA PenTest+ exam hard? ›

The PT0-002: CompTIA PenTest+ certification is one of the intermediate-level CompTIA courses specialized for cybersecurity professionals dealing with vulnerability management and penetration testing. It is considered one of the hardest certification exams compared to other CompTIA courses.

How many questions are on the PenTest+ exam? ›

The CompTIA PenTest+ exam has no more than 85 questions. After completing the exam, you will be asked to fill out some optional exit survey information about your study practices and why you decided to get certified. This will consist of about 12 multiple choice questions.

What score do you need to pass PenTest+? ›

Exam Details
Exam CodePT0-002
Number of QuestionsMaximum of 85 questions
Type of QuestionsPerformance-based and multiple choice
Length of Test165 minutes
Passing Score750 (on a scale of 100-900)
7 more rows

How long should I study for PenTest+? ›

For PenTest+ I added maybe 5 hours to know more about the paper and legal stuff. If you do not have IT experience at all, I guess you need over 100 hours to get exam ready. The questions are straightforward and easy to understand. If you pass the exam, you have theoretical knowledge about a wide but realistic area.

Is CompTIA PenTest+ entry level? ›

The CompTIA PenTest+ (PT0-001) is an entry-level security certification, which means it's an intermediate-level IT certification. Earning the PenTest+ means passing a 165-minute, 85-question exam with a 750 out of 900, which is an 83%.

Is CySA harder than PenTest? ›

Exam Difficulty

It further depends on how much prior knowledge you have of each subject. For example, if you have a few years of penetration testing experience, the PenTest+ will undoubtedly be easier than the CySA+, because the exam is more in line with your prior knowledge and experience.

How hard is pen testing? ›

It takes 48 hours to complete, but it shows that you know how to tackle the security issues that less advanced ethical hackers can't handle. It's one of the industry's most difficult tests. If you've passed it, companies know that you can take on the toughest problems out there.

Is pen testing stressful? ›

Pen testing is a complex and stressful task to complete, both for those testing and for those being tested.

How many hours a week do pen testers work? ›

A 37-hour working week is standard in this role, but flexible working practices are common, and you may need to work outside of a typical 9am to 5pm pattern.

How long is PenTest+ Good For? ›

Your CompTIA PenTest+ certification is good for three years from the date you pass your certification exam. Through our continuing education (CE) program, you can easily renew CompTIA PenTest+ and extend it for additional three-year periods.

Can you get a job with PenTest+? ›

There are several careers for professionals who are PenTest+ certified. This credential can help you land a job as a Penetration Tester, Vulnerability Tester, Security Analyst, Vulnerability Assessment Analyst and Network/Cloud/Application Security Specialist.

How much do physical Pentesters make? ›

As of May 2021, PayScale reports that the median annual penetration tester salary is around $86,000. A host of factors impact the salary, including education, experience, job type and job location. For example, penetration testers with 10 to 20 years of experience in the field can earn more than $120,000 yearly.

Is pen testing boring? ›

Yes – it's really fun. A career in penetration testing offers a good variety of work and a chance to be a little bit geeky. There's a big need for ethical hackers and penetration testers – it's quite a small community and there is a strong demand for it.

Is there a demand for Pentesters? ›

Job outlook

The US Bureau of Labor Statistics (BLS) projects 35 percent job growth for information security analysts, including penetration testers, between 2021 and 2031 [2]. This is much faster than the average for all occupations in the US.

Is Pentesting a good career 2022? ›

Penetration testing is one of the most sought-after careers these days. The demand for expert penetration testers and information security analysts is growing rapidly. According to the U.S. Bureau of Labor Statistics, information security analyst jobs will grow by 35 per cent by 2031.

Is PenTest+ better than CEH? ›

Although each exam has its advantages and disadvantages; the CEH is a more well-known, regarded, and trustworthy exam than the PenTest+. While the PenTest+ has several advantages, such as cost, it still has a long way to go before it is considered on par with the CEH.

How much does an entry level Pentester make? ›

Payscale reports that entry-level penetration testers made an average annual salary of $67,950 as of September 2021.

Should I get PenTest+ or CEH? ›

Both credentials primarily focus on penetration skills. However, PenTest+ covers other areas of vulnerability management and assessment. At the same time, CEH concentrates more on a proactive approach which allows ethical hackers to perform a pentest using the same tools and techniques that the hackers do.

What should I study for PenTest? ›

To determine the resiliency of the network against attacks, you will need the following knowledge and skills:
  • Plan and scope a penetration testing engagement including vulnerability scanning.
  • Understand legal and compliance requirements.
  • Analyze results.
  • Produce a written report with remediation techniques.
Nov 22, 2021

Which is harder PenTest+ or CEH? ›

Look at any forum about CEH vs. PenTest+ and it will tell you that the PenTest+ is a much more difficult test. The PenTest+ has thus far been considered to be a challenging exam, even to those that are well experienced in penetration testing.

How much do pen testers make a year? ›

The BLS projects around 19,500 annual job openings for information security analysts, a field which includes penetration testers. As of December 2022, Payscale reported a typical base salary of nearly $90,000 per year for pen testers. At the low end (bottom 10%), pen testers earn about $70,000 per year.

Do you need to know coding for pen testing? ›

Writing code is not required. These analysis skills are expected to grow in the foreseeable future as software continues to introduce new vulnerabilities. For penetration testers who want to learn coding, it is recommended to start with Python because of its usefulness in cybersecurity.

Can pen testers work from home? ›

Freelance pentesters have the liberty of working from wherever they want, unless they get subcontracted to work on on-site jobs that require them to travel. Otherwise, they can work from the comfort of their homes if they have reliable Internet connections, or from cafes or malls.

Do pen testers travel a lot? ›

The first thing to be aware of is the potential for travel — lots of it. Pentesting companies work with clients across the country, and to run these tests you'll often have to be on-site working directly with the IT staff.

Are pen testers in high demand? ›

It is anticipated that an additional 16,600 cyber security professionals will be needed nationally by 2026, including penetration testers.

Do you have to be smart to be a pentester? ›

Having good technical skills is important, but it is more important to be able to think on your feet and approach a test a little bit like a game, “like capture the flag, where you are trying to get into an organization as opposed to being a really smart, astute technical person,” Vogel says.

How much can I make with a comptia PenTest+ certification? ›

Different skills can affect your salary. In fact, according to a recent survey by Certification Magazine, in 2021, PenTest+ holders were earning an average salary of $114,840 in the U.S. and the equivalent of $99,950 worldwide.

How much do freelance pentesters make? ›

As of May 2021, PayScale reports that the median annual penetration tester salary is around $86,000. A host of factors impact the salary, including education, experience, job type and job location. For example, penetration testers with 10 to 20 years of experience in the field can earn more than $120,000 yearly.

Is Python enough for Pentesting? ›

The authors of 'Black Hat Python' explain the importance of learning Python for pen testing, how it helps create scripts to hack networks and endpoints, and more. Python is a must-know programming language for anyone seeking a career in penetration testing.

What is the highest pen tester salary? ›

While ZipRecruiter is seeing annual salaries as high as $173,500 and as low as $63,500, the majority of Penetration Tester salaries currently range between $96,500 (25th percentile) to $134,500 (75th percentile) with top earners (90th percentile) making $156,000 annually across the United States.

Do pen testers work from home? ›

Freelance pentesters have the liberty of working from wherever they want, unless they get subcontracted to work on on-site jobs that require them to travel. Otherwise, they can work from the comfort of their homes if they have reliable Internet connections, or from cafes or malls.

Are Pentesters in demand? ›

Job outlook

The US Bureau of Labor Statistics (BLS) projects 35 percent job growth for information security analysts, including penetration testers, between 2021 and 2031 [2]. This is much faster than the average for all occupations in the US.

Is being a Pentester worth it? ›

Yes – it's really fun. A career in penetration testing offers a good variety of work and a chance to be a little bit geeky. There's a big need for ethical hackers and penetration testers – it's quite a small community and there is a strong demand for it.

Videos

1. Passed the CompTIA PenTest+!
(Jowers Technology Solutions, LLC)
2. CompTIA Pentest+ Certification (PT0-001): Pentest+ Exam Practice Questions – Part 1|packtpub.com
(Packt )
3. Pass the CompTIA PenTest+ with these resources
(DaltonInCloud)
4. What is new with CompTIA PenTest+- PT0 002 | New Features of CompTIA Pentest | NetCom Learning
(NetCom Learning)
5. CompTIA PenTest+: Everything you need to know about the exam | Infosec Edge Webcast
(Infosec)
6. New Course | CompTIA Pentest+ (PT0-002)
(ITProTV)
Top Articles
Latest Posts
Article information

Author: Madonna Wisozk

Last Updated: 11/30/2022

Views: 6209

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Madonna Wisozk

Birthday: 2001-02-23

Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

Phone: +6742282696652

Job: Customer Banking Liaison

Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.