Skip to main content

PenTest+ Practice Test (V3)

Dive into practice questions

Question 1

A penetration tester needs to help create a threat model of a custom application. Which of the following is the most likely framework the tester will use?

A. MITRE ATT&CK

B. OSSTMM

C. CI/CD

D. DREAD

Question 2

A penetration tester discovers evidence of an advanced persistent threat on the network that is being tested. Which of the following should the tester do next?

A. Report the finding.

B. Analyze the finding.

C. Remove the threat.

D. Document the finding and continue testing.

Question 3

A penetration tester needs to evaluate the order in which the next systems will be selected for testing. Given the following output:

Hostname  IP address  CVSS 2.0 EPSS
hrdatabase 192.168.20.55 9.9 0.50
financesite  192.168.15.99 8.0 0.01
legaldatabase 192.168.10.2 8.2 0.60
fileserver 192.168.125.7 7.6 0.90
    

Which of the following targets should the tester select next?

A. fileserver

B. hrdatabase

C. legaldatabase

D. financesite

Question 4

A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sV -T2 -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?

A. OS fingerprinting

B. Attack path mapping

C. Service discovery

D. User enumeration

Question 5

A penetration tester needs to minimize PowerShell logging on a Windows host. The tester creates the following skeleton script:

Line 1: @echo off
Line 2: for %%i in ( "Domain Admins" "Enterprise Admins" "Schema Admins")
Line 3: do (
Line 4:    Get-ADUser -Filter %%i
Line 5: )
      

Which of the following should the tester do to complete the script and show all administrators in the group?

A. Modify line 5 to: ) >> c:\tmp\mylog.txt

B. Modify line 3 to: set count=100; do while (

C. Modify line 2 to: for %%i in ( "*admins*")

D. Modify line 4 to: dsquery group %%i -scope base --attr member

Answer key

Question 1: D (DREAD)

Question 2: A (Report the finding)
Question 3: A (fileserver)
Question 4: C (Service discovery)

Question 5: D (Modify line 4 to...)