CompTIA PT0-003 Practice Exams
Last updated on Apr 07,2025- Exam Code: PT0-003
- Exam Name: CompTIA PenTest+ Exam
- Certification Provider: CompTIA
- Latest update: Apr 07,2025
During a discussion of a penetration test final report, the consultant shows the following payload used to attack a system:
html
Copy code
7/<sCRitP>aLeRt(‘pwned’)</ScriPt>
Based on the code, which of the following options represents the attack executed by the tester and the associated countermeasure?
- A . Arbitrary code execution: the affected computer should be placed on a perimeter network
- B . SQL injection attack: should be detected and prevented by a web application firewall
- C . Cross-site request forgery: should be detected and prevented by a firewall
- D . XSS obfuscated: should be prevented by input sanitization
A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools.
Which of the following should the consultant engage first?
- A . Service discovery
- B . OS fingerprinting
- C . Host discovery
- D . DNS enumeration
A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools.
Which of the following should the consultant engage first?
- A . Service discovery
- B . OS fingerprinting
- C . Host discovery
- D . DNS enumeration
Which of the following is within the scope of proper handling and most crucial when working on a penetration testing report?
- A . Keeping both video and audio of everything that is done
- B . Keeping the report to a maximum of 5 to 10 pages in length
- C . Basing the recommendation on the risk score in the report
- D . Making the report clear for all objectives with a precise executive summary
A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials.
Which of the following should the tester use?
- A . route.exe print
- B . netstat.exe -ntp
- C . net.exe commands
- D . strings.exe -a
While performing an internal assessment, a tester uses the following command:
crackmapexec smb 192.168.1.0/24 -u user.txt -p Summer123@
Which of the following is the main purpose of the command?
- A . To perform a pass-the-hash attack over multiple endpoints within the internal network
- B . To perform common protocol scanning within the internal network
- C . To perform password spraying on internal systems
- D . To execute a command in multiple endpoints at the same time
While performing a penetration testing exercise, a tester executes the following command:
bash
Copy code
PS c:tools> c:hacksPsExec.exe \server01.comptia.org -accepteula cmd.exe Which of the following best explains what the tester is trying to do?
- A . Test connectivity using PSExec on the server01 using CMD.exe.
- B . Perform a lateral movement attack using PsExec.
- C . Send the PsExec binary file to the server01 using CMD.exe.
- D . Enable CMD.exe on the server01 through PsExec.
In a cloud environment, a security team discovers that an attacker accessed confidential information that was used to configure virtual machines during their initialization.
Through which of the following features could this information have been accessed?
- A . IAM
- B . Block storage
- C . Virtual private cloud
- D . Metadata services
A penetration tester is attempting to exfiltrate sensitive data from a client environment without alerting the client’s blue team.
Which of the following exfiltration methods most likely remain undetected?
- A . Cloud storage
- B . Email
- C . Domain Name System
- D . Test storage sites
A penetration tester is testing a power plant’s network and needs to avoid disruption to the grid.
Which of the following methods is most appropriate to identify vulnerabilities in the network?
- A . Configure a network scanner engine and execute the scan.
- B . Execute a testing framework to validate vulnerabilities on the devices.
- C . Configure a port mirror and review the network traffic.
- D . Run a network mapper tool to get an understanding of the devices.