Pentest+ PT0-002 2025/2026 Exam
Questions and Corresponding Answers
with Surety of 100% Pass Mark
.NET - 🧠ANSWER ✔✔A cross-platform software development framework,
previously called .NET Core, and the successor of the .NET Framework.
access control list (ACL) - 🧠ANSWER ✔✔Collection of access control
entries (ACEs) that determines which subjects (user accounts, host IP
addresses, and so on) are allowed or denied access to the object and the
privileges given (read only, read/write, and so on).
access control vestibule - 🧠ANSWER ✔✔Secure entry system with two
gateways, only one of which is open at any one time.
active directory (AD) - 🧠ANSWER ✔✔The standards-based directory
service from Microsoft that runs on Microsoft Windows servers.
address resolution protocol (ARP) - 🧠ANSWER ✔✔Broadcast mechanism
by which the hardware MAC address of an interface is matched to an IP
address on a local network segment.
1
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
,administrative controls - 🧠ANSWER ✔✔Security measures implemented to
monitor the adherence to organizational policies and procedures.
advanced persistent threat (APT) - 🧠ANSWER ✔✔An attacker's ability to
obtain, maintain, and diversify access to network systems using exploits
and malware.
aireplay-ng - 🧠ANSWER ✔✔A tool within the Aircrack-ng suite that injects
frames to generate traffic while attempting to crack an access points WPA-
PSK keys.
airodump-ng - 🧠ANSWER ✔✔Provides the ability to capture 802.11 frames
and then use the output to identify the Basic Service Set ID (MAC address)
of the access point along with the MAC address of a victim client device.
allow listing - 🧠ANSWER ✔✔A security configuration where access is
denied to any entity (software process, IP/domain, and so on) unless the
entity appears on a whitelist.
application programming interface (API) - 🧠ANSWER ✔✔A library of
programming utilities used, for example, to enable software developers to
access functions of the TCP/IP network stack under a particular operating
system.
2
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
,ARP poisoning - 🧠ANSWER ✔✔A network-based attack where an attacker
with access to the target local network segment redirects an IP address to
the MAC address of a computer that is not the intended recipient. This can
be used to perform a variety of attacks, including DoS, spoofing, and Man-
in-the-Middle.
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) -
🧠ANSWER ✔✔A knowledge base maintained by the MITRE Corporation
for listing and explaining specific adversary tactics, techniques, and
procedures.
attack narrative - 🧠ANSWER ✔✔A detailed explanation of the steps taken
while performing the activity.
attack surface - 🧠ANSWER ✔✔The points at which a network or application
receive external connections or inputs/outputs that are potential vectors to
be exploited by a threat actor.
attestation - 🧠ANSWER ✔✔An official verification of something as true or
authentic.
3
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
, authenticator - 🧠ANSWER ✔✔A PNAC switch or router that activates
EAPoL and passes a supplicant's authentication data to an authenticating
server, such as a RADIUS server.
authoritative transfer - 🧠ANSWER ✔✔Mechanism by which a secondary
name server obtains a read-only copy of zone records from the primary
server.
backdoor - 🧠ANSWER ✔✔A mechanism for gaining access to a computer
that bypasses or subverts the normal method of authentication.
badge cloning - 🧠ANSWER ✔✔Copying authentication data from an RFID
badge's microchip to another badge, which can be done through handheld
RFID writers, which are inexpensive and easy to use.
baiting - 🧠ANSWER ✔✔A form of social engineering in which an attacker
leaves infected physical media in an area where a victim finds it and then
inserts it into a computer.
banner grabbing - 🧠ANSWER ✔✔A technique used during reconnaissance
to gather information about network hosts and the services running on
open ports.
4
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
Questions and Corresponding Answers
with Surety of 100% Pass Mark
.NET - 🧠ANSWER ✔✔A cross-platform software development framework,
previously called .NET Core, and the successor of the .NET Framework.
access control list (ACL) - 🧠ANSWER ✔✔Collection of access control
entries (ACEs) that determines which subjects (user accounts, host IP
addresses, and so on) are allowed or denied access to the object and the
privileges given (read only, read/write, and so on).
access control vestibule - 🧠ANSWER ✔✔Secure entry system with two
gateways, only one of which is open at any one time.
active directory (AD) - 🧠ANSWER ✔✔The standards-based directory
service from Microsoft that runs on Microsoft Windows servers.
address resolution protocol (ARP) - 🧠ANSWER ✔✔Broadcast mechanism
by which the hardware MAC address of an interface is matched to an IP
address on a local network segment.
1
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
,administrative controls - 🧠ANSWER ✔✔Security measures implemented to
monitor the adherence to organizational policies and procedures.
advanced persistent threat (APT) - 🧠ANSWER ✔✔An attacker's ability to
obtain, maintain, and diversify access to network systems using exploits
and malware.
aireplay-ng - 🧠ANSWER ✔✔A tool within the Aircrack-ng suite that injects
frames to generate traffic while attempting to crack an access points WPA-
PSK keys.
airodump-ng - 🧠ANSWER ✔✔Provides the ability to capture 802.11 frames
and then use the output to identify the Basic Service Set ID (MAC address)
of the access point along with the MAC address of a victim client device.
allow listing - 🧠ANSWER ✔✔A security configuration where access is
denied to any entity (software process, IP/domain, and so on) unless the
entity appears on a whitelist.
application programming interface (API) - 🧠ANSWER ✔✔A library of
programming utilities used, for example, to enable software developers to
access functions of the TCP/IP network stack under a particular operating
system.
2
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
,ARP poisoning - 🧠ANSWER ✔✔A network-based attack where an attacker
with access to the target local network segment redirects an IP address to
the MAC address of a computer that is not the intended recipient. This can
be used to perform a variety of attacks, including DoS, spoofing, and Man-
in-the-Middle.
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) -
🧠ANSWER ✔✔A knowledge base maintained by the MITRE Corporation
for listing and explaining specific adversary tactics, techniques, and
procedures.
attack narrative - 🧠ANSWER ✔✔A detailed explanation of the steps taken
while performing the activity.
attack surface - 🧠ANSWER ✔✔The points at which a network or application
receive external connections or inputs/outputs that are potential vectors to
be exploited by a threat actor.
attestation - 🧠ANSWER ✔✔An official verification of something as true or
authentic.
3
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED
, authenticator - 🧠ANSWER ✔✔A PNAC switch or router that activates
EAPoL and passes a supplicant's authentication data to an authenticating
server, such as a RADIUS server.
authoritative transfer - 🧠ANSWER ✔✔Mechanism by which a secondary
name server obtains a read-only copy of zone records from the primary
server.
backdoor - 🧠ANSWER ✔✔A mechanism for gaining access to a computer
that bypasses or subverts the normal method of authentication.
badge cloning - 🧠ANSWER ✔✔Copying authentication data from an RFID
badge's microchip to another badge, which can be done through handheld
RFID writers, which are inexpensive and easy to use.
baiting - 🧠ANSWER ✔✔A form of social engineering in which an attacker
leaves infected physical media in an area where a victim finds it and then
inserts it into a computer.
banner grabbing - 🧠ANSWER ✔✔A technique used during reconnaissance
to gather information about network hosts and the services running on
open ports.
4
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED