Planning And Scoping A Penetration – Exam Questions – Ch.2 - Model Test Questions | CompTIA PenTest+ 1e Santos by Omar Santos. DOCX document preview.

Planning And Scoping A Penetration – Exam Questions – Ch.2

CompTIA® PenTest+ Cert Guide

Chapter 2 Planning and Scoping a Penetration Testing Assessment

1) All of these are important factors when thinking about the target audience of a testing report except which one?

A) The individual's responsibility and authority to make decisions based on your findings.

B) Who will have access to protected or sensitive information

C) Why the entity or individual needs the report

D) The approximate ages of the recipients

2) The _________ documentation would typically specify the testing timeline, location, preferred method, and IP addresses or networks from which testing will originate.

A) Nondisclosure

B) Rules of engagement

C) Audience analysis

D) Security control

3) A ______ chart shows the timeline for each task and for the project overall.

A) Tabular

B) Column

C) Pie

D) Gantt

4) Which of these is not a form of risk mitigation?

A) Risk transference

B) Risk avoidance

C) Risk acceptance

D) Risk sharing

5) What should you do after every testing engagement in order to preserve confidentiality?

A) Delete the email addresses of the clients from your address book

B) Delete any project records from your systems

C) Ask clients to sign a non-disclosure statement

D) All of the above

6) The purpose of conducting multiple point-in-time assessments is to:

A) Assess progress toward a goal

B) Save money

C) Redo tests to make sure the initial results are repeatable

D) Save time

7) What is CVSS?

A) A scoring system for IT security incident responses

B) A government agency that regulates IT security

C) A well-known private IT security company

D) A standards organization that releases security white papers

8) Risk _____ is how much of an undesirable outcome a risk taker is willing to accept in exchange for the potential benefit.

A) Transfer

B) Tolerance

C) Management

D) Mitigation

9) A _____ team is a corporate security team that defends the organization against cybersecurity threats.

A) Black

B) Red

C) Blue

D) Gray

10) Which of these is not a financial institution, by the definition of the Gramm-Leach-Bliley Act (GLBA)?

A) Real estate appraisers

B) Check-cashing businesses

C) Debt collectors

D) None of the above

11) Which of these is a set of regulations that governs healthcare data storage, confidentiality, and usage?

A) HIPAA

B) PCI DSS

C) FedRAMP

D) OSHA

12) _________ happens when a threat actor exploits more than one vulnerability in sequence to infiltrate progressively further into the system or network and gain more control over it.

A) Vulnerability chaining

B) Attack complexity

C) Modified base metrics

D) Exploit code maturity

13) ______ cannot exist without a(n) ________.

A) Vulnerabilities, Exploit

B) Exploits, Vulnerability

C) Access Vectors, Exploit

D) Exploits, User Interaction

14) Including a statement that says you provide no warranties or legal certifications concerning the testing tools and methods is an example of a:

A) Technical Constraint

B) Statement of Work

C) Contract

D) Disclaimer

15) A statement that certain areas cannot be tested due to operational limitations is an example of a:

A) Technical Constraint

B) Statement of Work

C) Contract

D) Disclaimer

16) What legal document specifies the terms of the agreement for testing and how you will get paid, as well as clear documentation of the services to be performed?

A) Technical Constraint

B) Statement of Work

C) Contract

D) Disclaimer

17) Which of these is a document that specifies the activities to be performed during the penetration testing engagement?

A) Master Service Agreement

B) Statement of Work

C) Contract

D) Nondisclosure Agreement

18) What type of contract allows quick negotiation for a series of projects, so you do not have to renegotiate the same terms every time you perform work for the same customer?

A) Master Service Agreement

B) Statement of Work

C) Contract

D) Nondisclosure Agreement

19) What type of legal document specifies and defines confidential material, knowledge, and information that should be kept private by both parties?

A) Master Service Agreement

B) Statement of Work

C) Contract

D) Nondisclosure Agreement

20) _______ refers to the uncontrolled growth of a project’s scale.

A) Blurring

B) Fuzzing

C) Scope creep

D) Proliferation

Document Information

Document Type:
DOCX
Chapter Number:
2
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 2 Planning And Scoping A Penetration Testing Assessment
Author:
Omar Santos

Connected Book

Model Test Questions | CompTIA PenTest+ 1e Santos

By Omar Santos

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party