Exam Details

  • Exam Code
    :PT0-003
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :272 Q&As
  • Last Updated
    :Apr 02, 2025

CompTIA CompTIA Certifications PT0-003 Questions & Answers

  • Question 171:

    A penetration tester is performing network reconnaissance. The tester wants to gather information about the network without causing detection mechanisms to flag the reconnaissance activities. Which of the following techniques should the tester use?

    A. Sniffing

    B. Banner grabbing

    C. TCP/UDP scanning

    D. Ping sweeps

  • Question 172:

    Which of the following components should a penetration tester include in an assessment report?

    A. User activities

    B. Customer remediation plan

    C. Key management

    D. Attack narrative

  • Question 173:

    A penetration tester is conducting a wireless security assessment for a client with 2.4GHz and 5GHz access points. The tester places a wireless USB dongle in the laptop to start capturing WPA2 handshakes. Which of the following steps should the tester take next?

    A. Enable monitoring mode using Aircrack-ng.

    B. Use Kismet to automatically place the wireless dongle in monitor mode and collect handshakes.

    C. Run KARMA to break the password.

    D. Research WiGLE.net for potential nearby client access points.

  • Question 174:

    A penetration testing team wants to conduct DNS lookups for a set of targets provided by the client. The team crafts a Bash script for this task. However, they find a minor error in one line of the script:

    1 #!/bin/bash

    2 for i in $(cat example.txt); do

    3 curl $i

    4 done

    Which of the following changes should the team make to line 3 of the script?

    A. resolvconf $i

    B. rndc $i

    C. systemd-resolve $i

    D. host $i

  • Question 175:

    A penetration tester needs to identify all vulnerable input fields on a customer website. Which of the following tools would be best suited to complete this request?

    A. DAST

    B. SAST

    C. IAST

    D. SCA

  • Question 176:

    A penetration tester enumerates a legacy Windows host on the same subnet. The tester needs to select exploit methods that will have the least impact on the host's operating stability. Which of the following commands should the tester try first?

    A. responder -I eth0 john responder_output.txt

    B. hydra -L administrator -P /path/to/pwlist.txt -t 100 rdp://

    C. msf > use msf > set msf > set PAYLOAD windows/meterpreter/reverse_tcp msf > run

    D. python3 ./buffer_overflow_with_shellcode.py 445

  • Question 177:

    A penetration tester wants to use multiple TTPs to assess the reactions (alerted, blocked, and others) by the client's current security tools. The threat-modeling team indicates the TTPs in the list might affect their internal systems and servers. Which of the following actions would the tester most likely take?

    A. Use a BAS tool to test multiple TTPs based on the input from the threat-modeling team.

    B. Perform an internal vulnerability assessment with credentials to review the internal attack surface.

    C. Use a generic vulnerability scanner to test the TTPs and review the results with the threat-modeling team.

    D. Perform a full internal penetration test to review all the possible exploits that could affect the systems.

  • Question 178:

    During an engagement, a penetration tester found some weaknesses that were common across the customer's entire environment. The weaknesses included the following:

    Weaker password settings than the company standard Systems without the company's endpoint security software installed Operating systems that were not updated by the patch management system.

    Which of the following recommendations should the penetration tester provide to address the root issue?

    A. Add all systems to the vulnerability management system.

    B. Implement a configuration management system.

    C. Deploy an endpoint detection and response system.

    D. Patch the out-of-date operating systems.

  • Question 179:

    A tester runs an Nmap scan against a Windows server and receives the following results:

    Nmap scan report for win_dns.local (10.0.0.5)

    Host is up (0.014s latency) Port State Service

    53/tcp open domain

    161/tcp open snmp

    445/tcp open smb-ds

    3389/tcp open rdp

    Which of the following TCP ports should be prioritized for using hash-based relays?

    A. 53

    B. 161

    C. 445

    D. 3389

  • Question 180:

    Which of the following is most important when communicating the need for vulnerability remediation to a client at the conclusion of a penetration test?

    A. Articulation of cause

    B. Articulation of impact

    C. Articulation of escalation

    D. Articulation of alignment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.