9. Reporting and Communication

Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 09. Reporting and Communication

1 / 61

Why is it important to know who your report audience is in the context of pen testing reports?

2 / 61

What does the term ’Secure Software Development Life Cycle’ refers to in the context of penetration testing reports?

3 / 61

Which of the following is not an example of a physical control that can be recommended in a penetration testing report?

4 / 61

Which of the following sources can provide information on which files need cleanup after exploitation failure during a penetration testing process?

5 / 61

What is the purpose of operational controls in an organization’s strategy?

6 / 61

Which of the following is an example of a biometric control that can be recommended in a penetration testing report?

7 / 61

Which of the following is NOT a listed example of a technical control for vulnerabilities found during a pen test?

8 / 61

Which of the following tools can ingest the results from many penetration testing tools and help you produce reports in formats such as CSV, HTML, and PDF?

9 / 61

What is the purpose of using the Common Vulnerability Scoring System (CVSS) in a penetration testing report?

10 / 61

Which of the following does a penetration testing report NOT typically include?

11 / 61

Which among the following is not typically a section in a penetration testing report?

12 / 61

Why is it important to analyze the results of your testing and correlate them to the actual environment?

13 / 61

What operational control makes users learn new skills and get more exposure to other security technologies and practices?

14 / 61

Your client might require you to report any critical findings at what time?

15 / 61

Which of the following activities should be performed during the post-engagement cleanup after delivering a penetration testing report to a client?

16 / 61

Which of the following elements is NOT typically included in a penetration testing report?

17 / 61

Which of the following is not considered an operational control to improve security operations?

18 / 61

Which of the following is NOT typically included in a penetration testing report?

19 / 61

What is an important process to follow as part of post-report delivery activities as a pen tester?

20 / 61

What is an important process to reduce the attack surface and meet industry standards and compliance as mentioned in the text?

21 / 61

What information should be included in the findings and recommendations section of a penetration testing report?

22 / 61

What is an important post-report delivery activity for a penetration tester according to the text?

23 / 61

Which of the following descriptions accurately portray the administrative control of Role-based Access Control (RBAC) as discussed in the CompTIA PenTest+ (PT0-002) study guide?

24 / 61

What term is used to describe a situation when a security device triggers an alarm, although there is no real malicious activity or attack?

25 / 61

Which of the following is NOT typically included in a penetration testing report?

26 / 61

Which of the following is not a type of contact you should have during a penetration testing engagement?

27 / 61

Which of the following is NOT an example of operational controls that often allow organizations to improve their security operations?

28 / 61

Which remediation method involves the process of distributing, installing, and applying software updates?

29 / 61

Which of the following is NOT considered as an important post-report delivery activity in a penetration testing engagement?

30 / 61

According to the text, which of the following should be communicated immediately during a penetration test?

31 / 61

Which of the following does not belong in a typical penetration testing report?

32 / 61

What is included in the post-report delivery activities of penetration testing?

33 / 61

Which of the following is NOT a recommended technical control that can be implemented as remediation for vulnerabilities found during penetration testing?

34 / 61

What is the purpose of job rotation as an operational control in improving security operations?

35 / 61

In a penetration testing report, which administrative control bases access permissions on specific roles or functions?

36 / 61

How should the contents of a penetration test report generally be considered in regard to classification and distribution?

37 / 61

Which of the following is NOT typically included in a penetration testing report, according to the CompTIA PenTest+ study guide?

38 / 61

Which of the following is NOT a content that should be included in a penetration testing report?

39 / 61

What should be included in a penetration testing report?

40 / 61

In role-based access control (RBAC), how are access rights and permissions assigned?

41 / 61

Which of the following is NOT an example of a physical control that can be recommended in a penetration testing report?

42 / 61

Which of the following is not a trigger for communicating with the client during a penetration test?

43 / 61

Which of the following is not considered a post-report delivery activity as outlined in the text?

44 / 61

In the context of post-engagement cleanup after a penetration test, what should you do to minimize residual effects on the systems that have been tested?

45 / 61

Which of the following is NOT a characteristic of a good cybersecurity policy according to the text?

46 / 61

What is an important step to take after delivering a penetration testing report to a client?

47 / 61

Which of the following is NOT a reason for potential scope creep in a penetration testing engagement?

48 / 61

What can be prevented through the use of parameterized queries and input sanitization?

49 / 61

Which of the following is NOT a circumstance under which a penetration tester should communicate findings to their client?

50 / 61

What are some examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test?

51 / 61

What is a recommended technical control method for reducing vulnerabilities found during a penetration test?

52 / 61

What are some recommended technical controls that can mitigate and remediate the vulnerabilities found during a penetration test?

53 / 61

Which of the following is NOT considered a physical control measure that can be recommended in a penetration testing report?

54 / 61

What is one of the technical controls recommended as a method of mitigating vulnerabilities found during a pen test?

55 / 61

What is an important activity you must complete after delivering a penetration testing report to a client according to the section ’9. Reporting and Communication’?

56 / 61

Why is it important to have a clear communication path and channels with your client during a penetration testing engagement?

57 / 61

What are some of the important post-report delivery activities a pen tester should follow?

58 / 61

What are some causes for scope creep in a penetration testing engagement?

59 / 61

Which of the following is NOT an example of a technical control recommended in the ’Reporting and Communication’ section of a penetration test?

60 / 61

What are the three metric groups used by CVSS to determine a vulnerability’s score?

61 / 61

Which of the following actions is NOT recommended as a technical control to mitigate and remediate vulnerabilities found during a pen test?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Pentest+ Anki deck.

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image

Refine your skills in reporting and communication with our CompTIA PenTest+ Chapter 09 practice questions.

Learn how to effectively document findings, communicate with stakeholders, and ensure compliance.
Supplement your study with our free Anki decks for comprehensive preparation.
Visit CompTIA’s official page for more insights.

Ready for the final chapter? Proceed to Chapter 10: Tools and Code Analysis to complete your PenTest+ certification preparation.

 

Explore our other free practice tests:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!