CompTIA PenTest+ Certification Exam

Here you have the best CompTIA PT0-002 practice exam questions

  • You have 451 total questions to study from
  • Each page has 5 questions, making a total of 91 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on May 8, 2025
  • This site is not affiliated with or endorsed by CompTIA.
Question 1 of 451

Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?

    Correct Answer: A

    The command 'chmod u+x script.sh' is used to modify the permissions of the file 'script.sh' to allow the owner (user) of the file to execute it. 'chmod' changes the file mode bits, 'u' refers to the user (file owner), and '+x' adds execute permissions. Therefore, this command specifically allows the owner of the script to execute it.

Question 2 of 451

A penetration tester gains access to a system and establishes persistence, and then run the following commands:

Which of the following actions is the tester MOST likely performing?

    Correct Answer: C

    The commands executed by the penetration tester are intended to clear the Bash history file while preserving its timestamp. The sequence starts by creating an empty file named 'temp'. The 'touch -r .bash_history temp' command then ensures that the 'temp' file has the same timestamp as the original '.bash_history' file. Finally, the 'mv temp .bash_history' command replaces the existing '.bash_history' file with the empty 'temp' file, effectively clearing the Bash history while keeping its original modification time unchanged. This action is most likely performed to cover tracks and make it harder for incident responders to detect the tester's activities on the system.

Question 3 of 451

A compliance-based penetration test is primarily concerned with:

    Correct Answer: C

    A compliance-based penetration test is primarily concerned with determining the efficacy of a specific set of security standards. The purpose of this test is to ensure that the organization adheres to certain security standards and regulatory requirements, such as HIPAA, PCI-DSS, and SOX. This involves assessing whether the security controls and processes in place meet the necessary criteria to protect sensitive data and maintain compliance with the relevant regulations.

Question 4 of 451

A penetration tester is explaining the MITRE ATT&CK framework to a company's chief legal counsel.

Which of the following would the tester MOST likely describe as a benefit of the framework?

    Correct Answer: A

    The MITRE ATT&CK framework is particularly beneficial for understanding the tactics used in security intrusions. By analyzing and comprehending these tactics, an organization can better disrupt potential intrusions and enhance its defense mechanisms. This framework provides a detailed knowledge base of adversary tactics and techniques, allowing organizations to prioritize security efforts, assess the effectiveness of security controls, and measure readiness to defend against attacks. Therefore, the primary benefit a penetration tester would highlight is the enhanced understanding of security intrusion tactics to effectively disrupt them.

Question 5 of 451

Which of the following BEST describe the OWASP Top 10? (Choose two.)

    Correct Answer: A, C

    The OWASP Top 10 is a well-recognized resource that identifies the most critical security risks to web applications. It prioritizes these risks based on their prevalence and potential impact. This list is updated periodically to reflect the evolving landscape of web application security. Therefore, the best descriptions are that it is a list of the most critical risks of web applications and that these risks are defined in order of importance.