Hack-the-Box: Certified Penetration Testing Specialist Questionnaire

    Hack-the-Box: Certified Penetration Testing Specialist Questionnaire
    The following self-assessment is required prior to enrollment to determine your preparedness for the content of this course. 
    Personal and Contact Information
    Birthdate
    Birthdate
    Mailing Address
    Mailing Address
    This course begins February 10, 2026. Please indicate your interest level:
    This course begins February 10, 2026. Please indicate your interest level:
    Multiple Choice (20 questions)

    1.  You receive a browser pop-up on a trusted site saying “Your system is infected - call this number!” What should you do?

    1.  You receive a browser pop-up on a trusted site saying “Your system is infected - call this number!” What should you do?

    2.  Your friend texts you a one-time code to log into a shared streaming account. That’s an example of:

    2.  Your friend texts you a one-time code to log into a shared streaming account. That’s an example of:

    3.  What is encryption?

    3.  What is encryption?

    4.  You log into public Wi-Fi at a café. To keep your data safe, you should:
    4.  You log into public Wi-Fi at a café. To keep your data safe, you should:

    5.  You’re asked to create a password for a work system. Which is best?

    5.  You’re asked to create a password for a work system. Which is best?

    6.  An email arrives from your manager with an attachment you weren’t expecting. You should:

    6.  An email arrives from your manager with an attachment you weren’t expecting. You should:

    7.  What is the purpose of a VPN?

    7.  What is the purpose of a VPN?

    8.  If your computer prompts you to install an update, the best practice is to:

    8.  If your computer prompts you to install an update, the best practice is to:

    9.  Which authentication factor is “something you have”?

    9.  Which authentication factor is “something you have”?

    10.  Your company requires you to use a password manager. The main benefit is:

    10.  Your company requires you to use a password manager. The main benefit is:

    11.  You accidentally visit a malicious site. To prevent re-infection in the future, you should:

    11.  You accidentally visit a malicious site. To prevent re-infection in the future, you should:

    12.  What is a fundamental method to determine if a web page you are visiting is encrypted?

    12.  What is a fundamental method to determine if a web page you are visiting is encrypted?

    13.  Your team uses shared cloud storage. To keep files secure, you should:

    13.  Your team uses shared cloud storage. To keep files secure, you should:

    14.  During a presentation, you display sensitive info without realizing. Next time, you should:
    14.  During a presentation, you display sensitive info without realizing. Next time, you should:

    15.  Your antivirus flags a file as suspicious. You:

    15.  Your antivirus flags a file as suspicious. You:

    16.  You create two accounts: one for work, one for personal use. This is an example of:

    16.  You create two accounts: one for work, one for personal use. This is an example of:

    17.  Which is an example of an IP address and port combination?

    17.  Which is an example of an IP address and port combination?

    18.  Which action best illustrates “monitoring”?

    18.  Which action best illustrates “monitoring”?

    19.  What’s the primary difference between hashing and encryption?

    19.  What’s the primary difference between hashing and encryption?

    20.  You’re setting up a new router. Choosing a non-default administrator password is important because:

    20.  You’re setting up a new router. Choosing a non-default administrator password is important because:

    Open Ended Questions (5)