CompTIA PenTest+ Certification - (PT0-003) Logo
CompTIA Logo

CompTIA PenTest+ Certification - (PT0-003) Exam Questions

467

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 1 Single Choice

What techniques are commonly used by port and vulnerability scanners to enumerate the services running on a target system?

Question 2 Single Choice

Tyler is conducting a penetration test and needs to execute various network protocols over a compromised system to interact with Windows systems remotely. Which of the following would be most suitable for this?

Question 3 Single Choice

During a cloud penetration test, an attacker gains access to a compromised account within an organization’s cloud environment. To avoid detection and complicate incident response, the attacker leverages cross-account permissions to transfer exfiltrated data to an external cloud account under their control. Which of the following best describes how cross-account resources are used in this scenario?

Question 4 Single Choice

You call up the CFO's assistant at an organization that is the target of your penetration test. You tell the assistant that you are an IRS agent and will be coming by this afternoon to meet with their boss. You ask the assistant for their email address so you can send them a PowerPoint to print out for the CFO to review before the meeting. When the assistant opens the PowerPoint, a warning pops up asking to enable Macros. You tell them to click accept and hurry because the CFO must get a copy of this before you arrive in 30 minutes. What type of social engineering principle are you using to exploit this organization?

Question 5 Single Choice

While using the Wayback Machine to examine a target website, you notice that certain critical files from a past version are no longer available in the current version. How might this information be used in a penetration test?

Question 6 Single Choice

You are attending a cybersecurity conference and just watched a security researcher demonstrating the exploitation of a web interface on a SCADA/ICS component. This caused the device to malfunction and be destroyed. You recognize that the same component is used throughout your company’s manufacturing plants. Which of the following mitigation strategies would provide you with the most immediate protection against this emergent threat?

Question 7 Single Choice

Devon conducts a vulnerability scan on a web application and it identifies a SQL injection vulnerability in the login form. Upon further testing, he confirms that the flaw is real and can be exploited. How should this result be classified?

Question 8 Single Choice

Which of the following weaknesses exist in WPS-enabled wireless networks?

Question 9 Single Choice

Which of the following attacks would most likely be used to create an inadvertent disclosure of information from an organization's database?

Question 10 Single Choice

A supplier needs to connect several laptops to an organization’s network as part of their service agreement. These laptops will be operated and maintained by the supplier. Victor, a cybersecurity analyst for the organization, is concerned that these laptops could contain some vulnerabilities that could weaken the network's security posture. What can Victor do to mitigate the risk to other devices on the network without having direct administrative access to the supplier’s laptops?
Page: 1 / 47