9. Reporting and Communication

Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 09. Reporting and Communication

1 / 61

Which of the following is NOT an example of operational controls that often allow organizations to improve their security operations?

2 / 61

What is an important step to take after delivering a penetration testing report to a client?

3 / 61

Why is it important to know who your report audience is in the context of pen testing reports?

4 / 61

Your client might require you to report any critical findings at what time?

5 / 61

Which of the following is an example of a biometric control that can be recommended in a penetration testing report?

6 / 61

What is a recommended technical control method for reducing vulnerabilities found during a penetration test?

7 / 61

Which of the following is NOT typically included in a penetration testing report?

8 / 61

What can be prevented through the use of parameterized queries and input sanitization?

9 / 61

Which of the following tools can ingest the results from many penetration testing tools and help you produce reports in formats such as CSV, HTML, and PDF?

10 / 61

Which of the following is NOT a listed example of a technical control for vulnerabilities found during a pen test?

11 / 61

According to the text, which of the following should be communicated immediately during a penetration test?

12 / 61

What are some examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test?

13 / 61

What is an important activity you must complete after delivering a penetration testing report to a client according to the section ’9. Reporting and Communication’?

14 / 61

In a penetration testing report, which administrative control bases access permissions on specific roles or functions?

15 / 61

What does the term ’Secure Software Development Life Cycle’ refers to in the context of penetration testing reports?

16 / 61

Which of the following is NOT an example of a physical control that can be recommended in a penetration testing report?

17 / 61

What should be included in a penetration testing report?

18 / 61

Why is it important to have a clear communication path and channels with your client during a penetration testing engagement?

19 / 61

What is the purpose of job rotation as an operational control in improving security operations?

20 / 61

What term is used to describe a situation when a security device triggers an alarm, although there is no real malicious activity or attack?

21 / 61

Which of the following is not considered an operational control to improve security operations?

22 / 61

Which of the following does not belong in a typical penetration testing report?

23 / 61

What is an important process to reduce the attack surface and meet industry standards and compliance as mentioned in the text?

24 / 61

How should the contents of a penetration test report generally be considered in regard to classification and distribution?

25 / 61

Which of the following is NOT typically included in a penetration testing report, according to the CompTIA PenTest+ study guide?

26 / 61

In role-based access control (RBAC), how are access rights and permissions assigned?

27 / 61

What is an important process to follow as part of post-report delivery activities as a pen tester?

28 / 61

Which remediation method involves the process of distributing, installing, and applying software updates?

29 / 61

Which among the following is not typically a section in a penetration testing report?

30 / 61

What is one of the technical controls recommended as a method of mitigating vulnerabilities found during a pen test?

31 / 61

Which of the following is NOT a characteristic of a good cybersecurity policy according to the text?

32 / 61

Which of the following is NOT a recommended technical control that can be implemented as remediation for vulnerabilities found during penetration testing?

33 / 61

What is included in the post-report delivery activities of penetration testing?

34 / 61

Which of the following is NOT a content that should be included in a penetration testing report?

35 / 61

Which of the following elements is NOT typically included in a penetration testing report?

36 / 61

Which of the following is not a trigger for communicating with the client during a penetration test?

37 / 61

What is an important post-report delivery activity for a penetration tester according to the text?

38 / 61

In the context of post-engagement cleanup after a penetration test, what should you do to minimize residual effects on the systems that have been tested?

39 / 61

Why is it important to analyze the results of your testing and correlate them to the actual environment?

40 / 61

Which of the following activities should be performed during the post-engagement cleanup after delivering a penetration testing report to a client?

41 / 61

What are the three metric groups used by CVSS to determine a vulnerability’s score?

42 / 61

What are some recommended technical controls that can mitigate and remediate the vulnerabilities found during a penetration test?

43 / 61

Which of the following is NOT typically included in a penetration testing report?

44 / 61

What operational control makes users learn new skills and get more exposure to other security technologies and practices?

45 / 61

What is the purpose of operational controls in an organization’s strategy?

46 / 61

What are some causes for scope creep in a penetration testing engagement?

47 / 61

Which of the following is NOT an example of a technical control recommended in the ’Reporting and Communication’ section of a penetration test?

48 / 61

Which of the following is NOT a circumstance under which a penetration tester should communicate findings to their client?

49 / 61

Which of the following is not considered a post-report delivery activity as outlined in the text?

50 / 61

Which of the following sources can provide information on which files need cleanup after exploitation failure during a penetration testing process?

51 / 61

Which of the following is NOT considered as an important post-report delivery activity in a penetration testing engagement?

52 / 61

What is the purpose of using the Common Vulnerability Scoring System (CVSS) in a penetration testing report?

53 / 61

Which of the following actions is NOT recommended as a technical control to mitigate and remediate vulnerabilities found during a pen test?

54 / 61

Which of the following is NOT considered a physical control measure that can be recommended in a penetration testing report?

55 / 61

Which of the following is not a type of contact you should have during a penetration testing engagement?

56 / 61

Which of the following descriptions accurately portray the administrative control of Role-based Access Control (RBAC) as discussed in the CompTIA PenTest+ (PT0-002) study guide?

57 / 61

Which of the following does a penetration testing report NOT typically include?

58 / 61

What information should be included in the findings and recommendations section of a penetration testing report?

59 / 61

Which of the following is NOT a reason for potential scope creep in a penetration testing engagement?

60 / 61

Which of the following is not an example of a physical control that can be recommended in a penetration testing report?

61 / 61

What are some of the important post-report delivery activities a pen tester should follow?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Refine your skills in reporting and communication with our CompTIA PenTest+ Chapter 09 practice questions.

Learn how to effectively document findings, communicate with stakeholders, and ensure compliance.
Supplement your study with our free Anki decks for comprehensive preparation.
Visit CompTIA’s official page for more insights.

Ready for the final chapter? Proceed to Chapter 10: Tools and Code Analysis to complete your PenTest+ certification preparation.

 

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!