

CompTIA PenTest+ Certification - (PT0-003) Exam Questions
Question 1 Single Choice
What techniques are commonly used by port and vulnerability scanners to enumerate the services running on a target system?
Question 2 Single Choice
Tyler is conducting a penetration test and needs to execute various network protocols over a compromised system to interact with Windows systems remotely. Which of the following would be most suitable for this?
Question 3 Single Choice
During a cloud penetration test, an attacker gains access to a compromised account within an organization’s cloud environment. To avoid detection and complicate incident response, the attacker leverages cross-account permissions to transfer exfiltrated data to an external cloud account under their control. Which of the following best describes how cross-account resources are used in this scenario?
Question 4 Single Choice
You call up the CFO's assistant at an organization that is the target of your penetration test. You tell the assistant that you are an IRS agent and will be coming by this afternoon to meet with their boss. You ask the assistant for their email address so you can send them a PowerPoint to print out for the CFO to review before the meeting. When the assistant opens the PowerPoint, a warning pops up asking to enable Macros. You tell them to click accept and hurry because the CFO must get a copy of this before you arrive in 30 minutes. What type of social engineering principle are you using to exploit this organization?
Question 5 Single Choice
While using the Wayback Machine to examine a target website, you notice that certain critical files from a past version are no longer available in the current version. How might this information be used in a penetration test?
Question 6 Single Choice
You are attending a cybersecurity conference and just watched a security researcher demonstrating the exploitation of a web interface on a SCADA/ICS component. This caused the device to malfunction and be destroyed. You recognize that the same component is used throughout your company’s manufacturing plants. Which of the following mitigation strategies would provide you with the most immediate protection against this emergent threat?
Question 7 Single Choice
Devon conducts a vulnerability scan on a web application and it identifies a SQL injection vulnerability in the login form. Upon further testing, he confirms that the flaw is real and can be exploited. How should this result be classified?
Question 8 Single Choice
Which of the following weaknesses exist in WPS-enabled wireless networks?
Question 9 Single Choice
Which of the following attacks would most likely be used to create an inadvertent disclosure of information from an organization's database?
Question 10 Single Choice
A supplier needs to connect several laptops to an organization’s network as part of their service agreement. These laptops will be operated and maintained by the supplier. Victor, a cybersecurity analyst for the organization, is concerned that these laptops could contain some vulnerabilities that could weaken the network's security posture. What can Victor do to mitigate the risk to other devices on the network without having direct administrative access to the supplier’s laptops?





