Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 40

Mary Smith

Tue, 21 Apr 2026

Comptia Pentest+ 2023 Questions and answer - Part 40

1. Which of the following choices best defines the term -risk appetite with regard to information security?

A) The ability of an organization to survive the effects of any situations or events affecting its business assets, such as computer systems or networks adversely
B) An organization-s acceptance and understanding of the likelihood and the influence of a specific threat on its networks or systems
C) If a penetration test is a financially supported by business expense, a key factor helps an organization.
D) In the information systems environment of an organization, the amount of risk an organization is willing to accept



2. For the handling of a penetration test report, which one of the following is a reasonable, and secure method?

A) The file is encrypted using DES, as detailed in your statement of work, sent to the declared recipients, and also a secondary communication channel is determined that assists to send the decryption password (if it was not declared in the SOW previously)
B) The file is sent through an E-mail in a plaintext format
C) The file is encrypted with AES-256, the declared recipients are provided with it as detailed in statement of your work, and a secondary communication channel is determined through which the decryption password is sent (if it was not declared in the SOW previously)
D) The file is encrypted with AES-256, being uploaded to a repository of reports that are publicly viewable and written by your organization, and a secondary channel is determined through which the decryption password is sent (if it was not declared in the SOW previously)



3. The broad, strategic information about testing techniques and practices, the decision-making processes guiding analysis, information collection, and risk evaluation are detailed in which section of a penetration test report?

A) Risk Ratings
B) Methodology
C) Appendixes
D) Executive Summary



4. A normalized and standardized representation of discovered vulnerabilities and the overall threat presented to an affected network or system are aimed to be provided by which element of a penetration test report?

A) Appendixes
B) Severity Rating of Vulnerability
C) Executive Summary
D) Methodology



5. Communicating with the client point of contact during a penetration test is to provide resolution, if a system or service is brought down during testing, both legitimate users and further testing is left unavailable. Which is the best describing term for this concept?

A) Remediation
B) Collision Detection
C) Retesting
D) De-escalation



1. Right Answer: D
Explanation: The executive summary is the described component. A 50,000-foot view of the penetration test report is aimed to be provided with the executive summary without relying on technical terms that may not mean anything to readers.

2. Right Answer: C
Explanation: The amount of risk an organization is willing to accept is termed as risk appetite. Much of the organization-s decision making is expected to drive with this when mitigation techniques for discovered vulnerabilities during a penetration test are pursued.

3. Right Answer: B
Explanation: For handling a penetration test report, the best solution is to encrypt the file with AES-256 that provides a detailed statement of work to the declared recipients, and a secondary communication channel is determined to send the decryption password, if not previously declared in the SOW.

4. Right Answer: B
Explanation: Information about testing techniques and practices used is detailed in the methodology section of a penetration test report. Also, the decision-making processes guiding information collection, analysis, risk evaluation, and the strategic approach to the engagement that was used by the penetration testing team are presented in detail.

5. Right Answer: D
Explanation: Rating paradigm of the vulnerability severity that is used in a penetration test report seeks to provide a standardized and normalized representation of discovered vulnerabilities and the overall threat they present to an affected network or system.

0 Comments

Leave a comment