Prepare for the CompTIA PenTest+ (PenTest+) certification by CompTIA with free exam-style practice questions on CyberCertPrep. The PenTest+ exam has 85 questions, a time limit of PenTest+ hours 45 minutes, and a passing score of 75%.
Choose from Practice mode, Exam Simulation, Weak Areas review, and Daily Challenge. Track your progress with detailed analytics and study with flashcards.
CompTIA PenTest+ (PenTest+) Exam Domain
Focus your study on this domain with targeted practice questions. This domain accounts for 22% of your PenTest+ exam score.
The Information Gathering & Vulnerability Scanning domain is one of 5 exam domains on the CompTIA PenTest+ (PenTest+) certification exam by CompTIA. At 22% of the total exam, this is one of the most heavily weighted domains — mastering it is critical for passing.
The PenTest+ exam consists of 85 questions with a time limit of 2 hours 45 minutes and a passing score of 75%. That means approximately 19 questions on your exam will come from the Information Gathering & Vulnerability Scanning domain.
SIEM (Security Information and Event Management)
A software solution that aggregates and analyzes security data from across the organization — including logs from firewa...
Port Scanning
A technique used to identify open ports and services available on a networked host by sending connection requests to a r...
Encryption
The process of converting plaintext data into an unreadable format (ciphertext) using a cryptographic algorithm and key,...
Phishing
A social engineering attack that uses fraudulent emails, text messages (smishing), or phone calls (vishing) to trick use...
Cross-Site Scripting (XSS)
A web security vulnerability that allows attackers to inject malicious client-side scripts (usually JavaScript) into web...
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information, exploiting human...
Zero-Day Exploit
An attack that targets a previously unknown vulnerability in software, hardware, or firmware before the vendor has relea...
Buffer Overflow
A vulnerability that occurs when a program writes more data to a memory buffer than it can hold, causing adjacent memory...
These certifications also cover topics related to Information Gathering & Vulnerability Scanning:
Information Security Governance — 17% of exam
Information Systems Auditing Process — 21% of exam
Information Technology & Security — 22% of exam
Security & Privacy Information Systems — 16% of exam
Vulnerability Management — 15% of exam
Vulnerability Management — 30% of exam