Free CompTIA PenTest+ PT0-002: 09 Reporting & Communication – Anki Cards

Ref:📕CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition

PenTest+ (PT0-002) Chapter 09. Reporting and Communication

1 / 61

Which remediation method involves the process of distributing, installing, and applying software updates?

2 / 61

Which of the following is NOT typically included in a penetration testing report?

3 / 61

What is included in the post-report delivery activities of penetration testing?

4 / 61

Which among the following is not typically a section in a penetration testing report?

5 / 61

What are some examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test?

6 / 61

Which of the following is not considered an operational control to improve security operations?

7 / 61

In role-based access control (RBAC), how are access rights and permissions assigned?

8 / 61

Which of the following is NOT a characteristic of a good cybersecurity policy according to the text?

9 / 61

What is an important process to reduce the attack surface and meet industry standards and compliance as mentioned in the text?

10 / 61

Which of the following actions is NOT recommended as a technical control to mitigate and remediate vulnerabilities found during a pen test?

11 / 61

What is the purpose of using the Common Vulnerability Scoring System (CVSS) in a penetration testing report?

12 / 61

Which of the following is not a trigger for communicating with the client during a penetration test?

13 / 61

Which of the following is NOT typically included in a penetration testing report?

14 / 61

What is one of the technical controls recommended as a method of mitigating vulnerabilities found during a pen test?

15 / 61

Which of the following does not belong in a typical penetration testing report?

16 / 61

Which of the following is an example of a biometric control that can be recommended in a penetration testing report?

17 / 61

What are some causes for scope creep in a penetration testing engagement?

18 / 61

What is an important step to take after delivering a penetration testing report to a client?

19 / 61

What is the purpose of job rotation as an operational control in improving security operations?

20 / 61

Which of the following is NOT a content that should be included in a penetration testing report?

21 / 61

What is the purpose of operational controls in an organization’s strategy?

22 / 61

Which of the following elements is NOT typically included in a penetration testing report?

23 / 61

What are the three metric groups used by CVSS to determine a vulnerability’s score?

24 / 61

Which of the following is NOT considered a physical control measure that can be recommended in a penetration testing report?

25 / 61

Which of the following is NOT considered as an important post-report delivery activity in a penetration testing engagement?

26 / 61

How should the contents of a penetration test report generally be considered in regard to classification and distribution?

27 / 61

What is an important post-report delivery activity for a penetration tester according to the text?

28 / 61

Which of the following is NOT a listed example of a technical control for vulnerabilities found during a pen test?

29 / 61

Which of the following is not a type of contact you should have during a penetration testing engagement?

30 / 61

What are some recommended technical controls that can mitigate and remediate the vulnerabilities found during a penetration test?

31 / 61

Which of the following tools can ingest the results from many penetration testing tools and help you produce reports in formats such as CSV, HTML, and PDF?

32 / 61

What is an important activity you must complete after delivering a penetration testing report to a client according to the section ’9. Reporting and Communication’?

33 / 61

Which of the following descriptions accurately portray the administrative control of Role-based Access Control (RBAC) as discussed in the CompTIA PenTest+ (PT0-002) study guide?

34 / 61

Which of the following does a penetration testing report NOT typically include?

35 / 61

What operational control makes users learn new skills and get more exposure to other security technologies and practices?

36 / 61

In a penetration testing report, which administrative control bases access permissions on specific roles or functions?

37 / 61

What does the term ’Secure Software Development Life Cycle’ refers to in the context of penetration testing reports?

38 / 61

What are some of the important post-report delivery activities a pen tester should follow?

39 / 61

Which of the following is NOT a circumstance under which a penetration tester should communicate findings to their client?

40 / 61

Which of the following activities should be performed during the post-engagement cleanup after delivering a penetration testing report to a client?

41 / 61

What should be included in a penetration testing report?

42 / 61

Your client might require you to report any critical findings at what time?

43 / 61

Which of the following is not considered a post-report delivery activity as outlined in the text?

44 / 61

Why is it important to have a clear communication path and channels with your client during a penetration testing engagement?

45 / 61

Which of the following is NOT an example of a physical control that can be recommended in a penetration testing report?

46 / 61

In the context of post-engagement cleanup after a penetration test, what should you do to minimize residual effects on the systems that have been tested?

47 / 61

What term is used to describe a situation when a security device triggers an alarm, although there is no real malicious activity or attack?

48 / 61

Which of the following is NOT an example of a technical control recommended in the ’Reporting and Communication’ section of a penetration test?

49 / 61

Which of the following is NOT typically included in a penetration testing report, according to the CompTIA PenTest+ study guide?

50 / 61

Why is it important to analyze the results of your testing and correlate them to the actual environment?

51 / 61

What information should be included in the findings and recommendations section of a penetration testing report?

52 / 61

Which of the following is NOT a reason for potential scope creep in a penetration testing engagement?

53 / 61

What can be prevented through the use of parameterized queries and input sanitization?

54 / 61

Which of the following is NOT a recommended technical control that can be implemented as remediation for vulnerabilities found during penetration testing?

55 / 61

According to the text, which of the following should be communicated immediately during a penetration test?

56 / 61

Which of the following sources can provide information on which files need cleanup after exploitation failure during a penetration testing process?

57 / 61

Which of the following is not an example of a physical control that can be recommended in a penetration testing report?

58 / 61

What is an important process to follow as part of post-report delivery activities as a pen tester?

59 / 61

What is a recommended technical control method for reducing vulnerabilities found during a penetration test?

60 / 61

Which of the following is NOT an example of operational controls that often allow organizations to improve their security operations?

61 / 61

Why is it important to know who your report audience is in the context of pen testing reports?

Your score is

Share the Post:

Download Your FREE CompTIA PenTest+(PT0-002) Anki Deck!

Email issues? [ [email protected] ]

Share the Post:

Refine your skills in reporting and communication with our CompTIA PenTest+ Chapter 09 practice questions.

Learn how to effectively document findings, communicate with stakeholders, and ensure compliance.
Supplement your study with our Free Anki decks for comprehensive preparation.
Visit CompTIA’s official page for more insights.

Ready for the final chapter? Proceed to Chapter 10: Tools and Code Analysis to complete your PenTest+ certification preparation.

Related Posts

RSS  
  • WGU Master’s Degree Rankings 2026 | I Asked 3 AIs 300 Times to Find the Best One
    Table of Contents Which WGU Master’s Degree Is Actually Worth It? If you’re considering a master’s degree from WGU and can’t figure out which program to choose — cybersecurity, software engineering, AI/ML, data analytics — you’re not alone. The options are overwhelming, and most comparisons online are either outdated or purely opinion-based. So here’s a […]
  • How I Made $1.3 Million in Cybersecurity (With Exact Revenue Numbers)
    Table of Contents If you’re stuck at $50K–$100K and wondering, “How the hell do people make seven figures?” this is for you.I’m Josh Madakor. In 2025, I made $1.3 million in cybersecurity. Not from a corporate job. Not from VC funding. And definitely not from selling a bullshit course.In this article, I’ll break down everything: […]
  • The Best Laptops for Cyber Security in 2026: Stop Over-Analyzing, Start Building
    Table of Contents Let’s be real: most people think that to get into cyber security, you need to be a “super elite hacker” running 10 different virtual machines on a glowing, heavy-duty gaming laptop. Spoiler alert: That’s just not how the industry works. I’ve spent years in roles ranging from Senior Analyst to Security Engineer, […]