Exam Details

  • Exam Code
    :PT0-003
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :272 Q&As
  • Last Updated
    :Apr 02, 2025

CompTIA CompTIA Certifications PT0-003 Questions & Answers

  • Question 111:

    Which of the following describes the process of determining why a vulnerability scanner is not providing results?

    A. Root cause analysis

    B. Secure distribution

    C. Peer review

    D. Goal reprioritization

  • Question 112:

    A penetration tester is getting ready to conduct a vulnerability scan as part of the testing process. The tester will evaluate an environment that consists of a container orchestration cluster. Which of the following tools should the tester use to evaluate the cluster?

    A. Trivy

    B. Nessus

    C. Grype

    D. Kube-hunter

  • Question 113:

    A penetration tester presents the following findings to stakeholders:

    Control | Number of findings | Risk | Notes

    Encryption | 1 | Low | Weak algorithm noted

    Patching | 8 | Medium | Unsupported systems

    System hardening | 2 | Low | Baseline drift observed

    Secure SDLC | 10 | High | Libraries have vulnerabilities

    Password policy | 0 | Low | No exceptions noted

    Based on the findings, which of the following recommendations should the tester make? (Select two).

    A. Develop a secure encryption algorithm.

    B. Deploy an asset management system.

    C. Write an SDLC policy.

    D. Implement an SCA tool.

    E. Obtain the latest library version.

    F. Patch the libraries.

  • Question 114:

    A penetration tester needs to confirm the version number of a client's web application server. Which of the following techniques should the penetration tester use?

    A. SSL certificate inspection

    B. URL spidering

    C. Banner grabbing

    D. Directory brute forcing

  • Question 115:

    A penetration tester performs an assessment on the target company's Kubernetes cluster using kube-hunter. Which of the following types of vulnerabilities could be detected with the tool?

    A. Network configuration errors in Kubernetes services

    B. Weaknesses and misconfigurations in the Kubernetes cluster

    C. Application deployment issues in Kubernetes

    D. Security vulnerabilities specific to Docker containers

  • Question 116:

    A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings, and high-level statements. Which of the following sections of the report would most likely contain this information?

    A. Quality control

    B. Methodology

    C. Executive summary

    D. Risk scoring

  • Question 117:

    A penetration tester completed OSINT work and needs to identify all subdomains for mydomain.com. Which of the following is the best command for the tester to use?

    A. nslookup mydomain.com ?/path/to/results.txt

    B. crunch 1 2 | xargs -n 1 -I 'X' nslookup X.mydomain.com

    C. dig @8.8.8.8 mydomain.com ANY ?/path/to/results.txt

    D. cat wordlist.txt | xargs -n 1 -I 'X' dig X.mydomain.com

  • Question 118:

    While conducting a reconnaissance activity, a penetration tester extracts the following information:

    Emails: - [email protected] - [email protected] - [email protected]

    Which of the following risks should the tester use to leverage an attack as the next step in the security assessment?

    A. Unauthorized access to the network

    B. Exposure of sensitive servers to the internet

    C. Likelihood of SQL injection attacks

    D. Indication of a data breach in the company

  • Question 119:

    As part of an engagement, a penetration tester wants to maintain access to a compromised system after rebooting. Which of the following techniques would be best for the tester to use?

    A. Establishing a reverse shell

    B. Executing a process injection attack

    C. Creating a scheduled task

    D. Performing a credential-dumping attack

  • Question 120:

    Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?

    A. Creating registry keys

    B. Installing a bind shell

    C. Executing a process injection

    D. Setting up a reverse SSH connection

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.