9. Reporting and Communication

  Ref:đź“•CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) 2nd Edition
Press the Start button to begin the practice test.

PenTest+ (PT0-002) Chapter 09. Reporting and Communication

1 / 61

Which of the following is an example of a biometric control that can be recommended in a penetration testing report?

2 / 61

Which of the following does a penetration testing report NOT typically include?

3 / 61

Which of the following descriptions accurately portray the administrative control of Role-based Access Control (RBAC) as discussed in the CompTIA PenTest+ (PT0-002) study guide?

4 / 61

Which of the following does not belong in a typical penetration testing report?

5 / 61

What term is used to describe a situation when a security device triggers an alarm, although there is no real malicious activity or attack?

6 / 61

What is the purpose of job rotation as an operational control in improving security operations?

7 / 61

What does the term ’Secure Software Development Life Cycle’ refers to in the context of penetration testing reports?

8 / 61

Which of the following is NOT a content that should be included in a penetration testing report?

9 / 61

Which of the following is NOT considered as an important post-report delivery activity in a penetration testing engagement?

10 / 61

What are some causes for scope creep in a penetration testing engagement?

11 / 61

Your client might require you to report any critical findings at what time?

12 / 61

What is an important post-report delivery activity for a penetration tester according to the text?

13 / 61

What is an important activity you must complete after delivering a penetration testing report to a client according to the section ’9. Reporting and Communication’?

14 / 61

Which of the following actions is NOT recommended as a technical control to mitigate and remediate vulnerabilities found during a pen test?

15 / 61

Why is it important to have a clear communication path and channels with your client during a penetration testing engagement?

16 / 61

Which of the following is NOT typically included in a penetration testing report?

17 / 61

What should be included in a penetration testing report?

18 / 61

Which of the following activities should be performed during the post-engagement cleanup after delivering a penetration testing report to a client?

19 / 61

Which remediation method involves the process of distributing, installing, and applying software updates?

20 / 61

Why is it important to analyze the results of your testing and correlate them to the actual environment?

21 / 61

What is included in the post-report delivery activities of penetration testing?

22 / 61

Which of the following is NOT a recommended technical control that can be implemented as remediation for vulnerabilities found during penetration testing?

23 / 61

What are the three metric groups used by CVSS to determine a vulnerability’s score?

24 / 61

What are some of the important post-report delivery activities a pen tester should follow?

25 / 61

According to the text, which of the following should be communicated immediately during a penetration test?

26 / 61

In a penetration testing report, which administrative control bases access permissions on specific roles or functions?

27 / 61

Which of the following is not a trigger for communicating with the client during a penetration test?

28 / 61

What is the purpose of operational controls in an organization’s strategy?

29 / 61

What are some recommended technical controls that can mitigate and remediate the vulnerabilities found during a penetration test?

30 / 61

Which of the following is NOT a listed example of a technical control for vulnerabilities found during a pen test?

31 / 61

What information should be included in the findings and recommendations section of a penetration testing report?

32 / 61

Which of the following is NOT a reason for potential scope creep in a penetration testing engagement?

33 / 61

Which of the following sources can provide information on which files need cleanup after exploitation failure during a penetration testing process?

34 / 61

Which of the following is NOT typically included in a penetration testing report?

35 / 61

Which of the following is NOT an example of a physical control that can be recommended in a penetration testing report?

36 / 61

Why is it important to know who your report audience is in the context of pen testing reports?

37 / 61

Which of the following is NOT an example of a technical control recommended in the ’Reporting and Communication’ section of a penetration test?

38 / 61

Which of the following tools can ingest the results from many penetration testing tools and help you produce reports in formats such as CSV, HTML, and PDF?

39 / 61

What is one of the technical controls recommended as a method of mitigating vulnerabilities found during a pen test?

40 / 61

What is an important step to take after delivering a penetration testing report to a client?

41 / 61

Which of the following is NOT an example of operational controls that often allow organizations to improve their security operations?

42 / 61

What is the purpose of using the Common Vulnerability Scoring System (CVSS) in a penetration testing report?

43 / 61

In role-based access control (RBAC), how are access rights and permissions assigned?

44 / 61

What is a recommended technical control method for reducing vulnerabilities found during a penetration test?

45 / 61

Which of the following is NOT a characteristic of a good cybersecurity policy according to the text?

46 / 61

In the context of post-engagement cleanup after a penetration test, what should you do to minimize residual effects on the systems that have been tested?

47 / 61

Which of the following elements is NOT typically included in a penetration testing report?

48 / 61

Which of the following is NOT considered a physical control measure that can be recommended in a penetration testing report?

49 / 61

What are some examples of technical controls that can be recommended as mitigations and remediation of the vulnerabilities found during a pen test?

50 / 61

What is an important process to reduce the attack surface and meet industry standards and compliance as mentioned in the text?

51 / 61

What can be prevented through the use of parameterized queries and input sanitization?

52 / 61

Which of the following is not an example of a physical control that can be recommended in a penetration testing report?

53 / 61

Which of the following is not considered a post-report delivery activity as outlined in the text?

54 / 61

Which of the following is not considered an operational control to improve security operations?

55 / 61

Which of the following is NOT typically included in a penetration testing report, according to the CompTIA PenTest+ study guide?

56 / 61

How should the contents of a penetration test report generally be considered in regard to classification and distribution?

57 / 61

Which of the following is not a type of contact you should have during a penetration testing engagement?

58 / 61

Which of the following is NOT a circumstance under which a penetration tester should communicate findings to their client?

59 / 61

What operational control makes users learn new skills and get more exposure to other security technologies and practices?

60 / 61

What is an important process to follow as part of post-report delivery activities as a pen tester?

61 / 61

Which among the following is not typically a section in a penetration testing report?

Your score is

Free CompTIA Pentest+ Anki decks are now available!

Click the download button after filling out the form below
to get your free practice exam Anki deck!

CompTIA Pentest+(pt0-002) Practice test Anki deck image
CompTIA Pentest+ Practice questions Sample image
Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!