PenTest+ Tests Penetration Testing Methodology and Reporting — Not Just Attack Execution
The exam tests the full pentest lifecycle: planning, reconnaissance, scanning, exploitation, post-exploitation, and professional reporting within legal and ethical boundaries.
Check Your Readiness →Most candidates understand CompTIA PenTest+ concepts — and still fail. This exam tests how you apply knowledge under pressure.
CompTIA PenTest+ (PT0-002) tests the full penetration testing lifecycle with emphasis on planning, scoping, and professional reporting within legal and ethical boundaries.
Extract sample data to demonstrate the severity of the finding
Stop at demonstrating access — document the finding with evidence (screenshots without PII), assess business impact, and report immediately; extracting actual data may violate scope and data protection laws
Test the out-of-scope system since it poses a real risk
Document the discovery, immediately notify the client contact, pause testing of that system, and await explicit written authorization before proceeding — out-of-scope testing without authorization is unauthorized access
Use the credentials to access as many systems as possible to demonstrate the full impact
Demonstrate the minimum access required to prove the impact, document the escalation path, and immediately report the critical finding — unnecessary access beyond what is required to demonstrate the vulnerability exceeds scope
Every action during a pentest must be within the agreed scope defined in the Rules of Engagement. Acting outside scope — even if technically possible — is illegal. PenTest+ heavily tests scope awareness.
The methodology requires thorough vulnerability scanning and analysis before exploitation attempts. Candidates who select exploitation answers without first enumerating and prioritizing vulnerabilities skip required methodology steps.
Passive OSINT is undetectable. Active scanning generates network traffic and logs. The choice between them has detection risk implications that the exam tests explicitly.
Professional pentest reports have two sections: an executive summary for non-technical stakeholders and technical findings for the security team. Candidates who report only technical findings fail the professional communication component.
CVSS v3 Base Score considers Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope, and CIA Impact. Candidates who assign CVSS scores without understanding these components produce inaccurate risk ratings.
PenTest+ tests professional pentesting judgment. Test whether you know the methodology and not just the techniques.