Exam Details

  • Exam Code
    :PT0-003
  • Exam Name
    :CompTIA PenTest+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :271 Q&As
  • Last Updated
    :Mar 21, 2025

CompTIA CompTIA Certifications PT0-003 Questions & Answers

  • Question 31:

    A penetration tester is taking screen captures of hashes obtained from a domain controller. Which of the following best explains why the penetration tester should immediately obscure portions of the images before saving?

    A. To maintain confidentiality of data/information

    B. To avoid disclosure of how the hashes were obtained

    C. To make the hashes appear shorter and easier to crack

    D. To prevent analysis based on the type of hash

  • Question 32:

    A penetration tester is performing an assessment for an organization and must gather valid user credentials. Which of the following attacks would be best for the tester to use to achieve this objective?

    A. Wardriving

    B. Captive portal

    C. Deauthentication

    D. Impersonation

  • Question 33:

    A penetration tester is performing a vulnerability scan on a large ATM network. One of the organization's requirements is that the scan does not affect legitimate clients' usage of the ATMs. Which of the following should the tester do to best meet the company's vulnerability scan requirements?

    A. Use Nmap's -T2 switch to run a slower scan and with less resources.

    B. Run the scans using multiple machines.

    C. Run the scans only during lunch hours.

    D. Use Nmap's -host-timeout switch to skip unresponsive targets.

  • Question 34:

    Which of the following tools would be best to use to conceal data in various kinds of image files?

    A. Kismet

    B. Snow

    C. Responder

    D. Metasploit

  • Question 35:

    Which of the following describes a globally accessible knowledge base of adversary tactics and techniques based on real-world observations?

    A. OWASP Top 10

    B. MITRE ATTandCK

    C. Cyber Kill Chain

    D. Well-Architected Framework

  • Question 36:

    A security engineer is trying to bypass a network IPS that isolates the source when the scan exceeds 100 packets per minute. The scope of the scan is to identify web servers in the 10.0.0.0/16 subnet.

    Which of the following commands should the engineer use to achieve the objective in the least amount of time?

    A. nmap -T3 -p 80 10.0.0.0/16 -- max-hostgroup 100

    B. nmap -TO -p 80 10.0.0.0/16

    C. nmap -T4 -p 80 10.0.0.0/16 -- max-rate 60

    D. nmap -T5 -p 80 10.0.0.0/16 -- min-rate 80

  • Question 37:

    Which of the following compliance requirements would be BEST suited in an environment that processes credit card data?

    A. PCI DSS

    B. ISO 27001

    C. SOX

    D. GDPR

  • Question 38:

    During a test of a custom-built web application, a penetration tester identifies several vulnerabilities. Which of the following would be the most interested in the steps to reproduce these vulnerabilities?

    A. Operations staff

    B. Developers

    C. Third-party stakeholders

    D. C-suite executives

  • Question 39:

    A company obtained permission for a vulnerability scan from its cloud service provider and now wants to test the security of its hosted data.

    Which of the following should the tester verify FIRST to assess this risk?

    A. Whether sensitive client data is publicly accessible

    B. Whether the connection between the cloud and the client is secure

    C. Whether the client's employees are trained properly to use the platform

    D. Whether the cloud applications were developed using a secure SDLC

  • Question 40:

    A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were

    full and directed them to the fake login page to remedy the issue.

    Which of the following BEST describes this attack?

    A. Credential harvesting

    B. Privilege escalation

    C. Password spraying

    D. Domain record abuse

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PT0-003 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.