20:00

Free Test
/ 10

Quiz

1/10
Reconnaissance and Enumeration
You are conducting an external reconnaissance engagement for a financial services company. You need to identify web servers, mail servers, and DNS information without sending traffic directly to the target. Which of the following OSINT techniques would be most appropriate as a first step?
Select the answer
1 correct answer
A.
Run Nmap SYN scan against all class B subnets
B.
Query public DNS records and use WHOIS lookups
C.
Perform a Metasploit port scan
D.
Launch a Nessus vulnerability scan

Quiz

2/10
Engagement Management
During an authorized penetration test, you discover unauthorized access by an unknown threat actor to the client's systems. What is your primary responsibility under rules of engagement?
Select the answer
1 correct answer
A.
Immediately cease testing and report findings to the client contact
B.
Continue testing to complete the engagement scope
C.
Attempt to trace the threat actor's identity
D.
Launch a counter-attack to isolate the threat actor

Quiz

3/10
Attacks and Exploits
You've identified a web application running an outdated version of Apache Struts vulnerable to CVE-2017-5645. The application processes user input through a vulnerable component. Which exploitation technique would be most effective to achieve remote code execution?
Select the answer
1 correct answer
A.
SQL injection against the database backend
B.
Cross-site scripting to steal session cookies
C.
Object deserialization attack via OGNL injection
D.
Cross-site request forgery to modify user data

Quiz

4/10
Vulnerability Discovery and Analysis
You run a Nessus scan against a client's internal network and receive output showing multiple CVSS 7.5 vulnerabilities. Before reporting these findings, what additional verification should you perform?
Select the answer
1 correct answer
A.
Report all findings immediately without verification
B.
Manually verify findings by attempting exploitation
C.
Cross-reference with Nessus plugin documentation and verify exploitability
D.
Assume all findings are false positives

Quiz

5/10
Post-exploitation and Lateral Movement
After gaining initial access to a Linux web server, you discover the server is part of an internal network. The web server has access to a database server on an internal subnet. What is the appropriate next step for demonstrating lateral movement capability?
Select the answer
1 correct answer
A.
Exfiltrate all data from the web server immediately
B.
Establish persistence and enumerate the internal network
C.
Perform a denial-of-service attack on the database
D.
Attempt password brute-force on all visible services

Quiz

6/10
Reconnaissance and Enumeration
You're preparing an Nmap command for a client engagement. The rules of engagement permit full port scanning with service identification. Which Nmap arguments would provide efficient service identification while minimizing scan time?
Select the answer
1 correct answer
A.
nmap -p- -sV --script vuln target
B.
nmap -p 1-1000 -sS -sV target
C.
nmap -p- -sS -sV target
D.
nmap -sU -p- target

Quiz

7/10
Engagement Management
You've completed your penetration test and discovered 47 vulnerabilities across the client's infrastructure. Your rules of engagement specify that you must deliver findings within 48 hours of test completion. The client requests a meeting before you finalize the report. What is the most appropriate action?
Select the answer
1 correct answer
A.
Deliver only high-severity findings immediately and delay low-severity items
B.
Request a rules of engagement amendment to extend the deadline
C.
Schedule the meeting within the 48-hour window and deliver the complete report on time
D.
Provide verbally only without written documentation

Quiz

8/10
Attacks and Exploits
During a Metasploit-based exploitation, you gain a meterpreter shell on a Windows server. You need to escalate privileges from a standard domain user to SYSTEM. Which technique would be most appropriate given Windows security mechanisms?
Select the answer
1 correct answer
A.
Run "getsystem" command to auto-escalate privileges
B.
Manually create a new administrator account
C.
Perform UAC bypass using a recognized technique
D.
Steal NTLM hashes and crack them offline

Quiz

9/10
Vulnerability Discovery and Analysis
Your Nessus scan identified a service running on TCP port 8080. The plugin detected it as Apache Tomcat 7.0.94 with a CVSS score of 8.1. When you manually connect, the banner shows Tomcat 9.0.50. What does this likely indicate?
Select the answer
1 correct answer
A.
Nessus is always incorrect about service versions
B.
The service is hiding its true version with a banner
C.
The system has been updated since the scan
D.
There are two Tomcat instances running

Quiz

10/10
Post-exploitation and Lateral Movement
You've established persistence on a compromised Linux system. You need to move laterally to a database server on an internal subnet. The compromised host has network connectivity but you cannot interact directly due to firewall rules. Which technique would most effectively enable lateral movement?
Select the answer
1 correct answer
A.
Set up a reverse SSH tunnel back to your attack machine
B.
Perform port forwarding through the compromised host
C.
Deploy a socks proxy through the meterpreter session
D.
All options achieve lateral movement equally
Looking for more questions?Buy now

CompTIA Pentest+ Practice test unlocks all online simulator questions

Thank you for choosing the free version of the CompTIA Pentest+ practice test! Further deepen your knowledge on CompTIA Simulator; by unlocking the full version of our CompTIA Pentest+ Simulator you will be able to take tests with over 200 constantly updated questions and easily pass your exam. 98% of people pass the exam in the first attempt after preparing with our 200 questions.

BUY NOW

What to expect from our CompTIA Pentest+ practice tests and how to prepare for any exam?

The CompTIA Pentest+ Simulator Practice Tests are part of the CompTIA Database and are the best way to prepare for any CompTIA Pentest+ exam. The CompTIA Pentest+ practice tests consist of 200 questions and are written by experts to help you and prepare you to pass the exam on the first attempt. The CompTIA Pentest+ database includes questions from previous and other exams, which means you will be able to practice simulating past and future questions. Preparation with CompTIA Pentest+ Simulator will also give you an idea of the time it will take to complete each section of the CompTIA Pentest+ practice test . It is important to note that the CompTIA Pentest+ Simulator does not replace the classic CompTIA Pentest+ study guides; however, the Simulator provides valuable insights into what to expect and how much work needs to be done to prepare for the CompTIA Pentest+ exam.

BUY NOW

CompTIA Pentest+ Practice test therefore represents an excellent tool to prepare for the actual exam together with our CompTIA practice test . Our CompTIA Pentest+ Simulator will help you assess your level of preparation and understand your strengths and weaknesses. Below you can read all the quizzes you will find in our CompTIA Pentest+ Simulator and how our unique CompTIA Pentest+ Database made up of real questions:

Info quiz:

  • Quiz name:CompTIA Pentest+
  • Total number of questions:200
  • Number of questions for the test:50
  • Pass score:80%

You can prepare for the CompTIA Pentest+ exams with our mobile app. It is very easy to use and even works offline in case of network failure, with all the functions you need to study and practice with our CompTIA Pentest+ Simulator.

Use our Mobile App, available for both Android and iOS devices, with our CompTIA Pentest+ Simulator . You can use it anywhere and always remember that our mobile app is free and available on all stores.

Our Mobile App contains all CompTIA Pentest+ practice tests which consist of 200 questions and also provide study material to pass the final CompTIA Pentest+ exam with guaranteed success. Our CompTIA Pentest+ database contain hundreds of questions and CompTIA Tests related to CompTIA Pentest+ Exam. This way you can practice anywhere you want, even offline without the internet.

BUY NOW