Pass4itsure > CompTIA > CompTIA Certifications > PT0-003 > PT0-003 Online Practice Questions and Answers

PT0-003 Online Practice Questions and Answers

Questions 4

A penetration tester cannot find information on the target company's systems using common OSINT methods. The tester's attempts to do reconnaissance against internet- facing resources have been blocked by the company's WAF. Which of the following is the best way to avoid the WAF and gather information about the target company's systems?

A. HTML scraping

B. Code repository scanning

C. Directory enumeration

D. Port scanning

Buy Now
Questions 5

During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?

A. On-path

B. Logic bomb

C. Rootkit

D. Buffer overflow

Buy Now
Questions 6

In a cloud environment, a security team discovers that an attacker accessed confidential information that was used to configure virtual machines during their initialization. Through which of the following features could this information have been accessed?

A. IAM

B. Block storage

C. Virtual private cloud

D. Metadata services

Buy Now
Questions 7

A penetration tester executes multiple enumeration commands to find a path to escalate privileges. Given the following command:

find / -user root -perm -4000 -exec ls -ldb {} \; 2>/dev/null

Which of the following is the penetration tester attempting to enumerate?

A. Attack path mapping

B. API keys

C. Passwords

D. Permission

Buy Now
Questions 8

A penetration tester needs to collect information over the network for further steps in an internal assessment. Which of the following would most likely accomplish this goal?

A. ntlmrelayx.py -t 192.168.1.0/24 -1 1234

B. nc -tulpn 1234 192.168.1.2

C. responder.py -I eth0 -wP

D. crackmapexec smb 192.168.1.0/24

Buy Now
Questions 9

A penetration tester is working on an engagement in which a main objective is to collect confidential information that could be used to exfiltrate data and perform a ransomware attack. During the engagement, the tester is able to obtain an internal foothold on the target network. Which of the following is the next task the tester should complete to accomplish the objective?

A. Initiate a social engineering campaign.

B. Perform credential dumping.

C. Compromise an endpoint.

D. Share enumeration.

Buy Now
Questions 10

A penetration tester completed a vulnerability scan against a web server and identified a single but severe vulnerability.

Which of the following is the BEST way to ensure this is a true positive?

A. Run another scanner to compare.

B. Perform a manual test on the server.

C. Check the results on the scanner.

D. Look for the vulnerability online.

Buy Now
Questions 11

A tester who is performing a penetration test discovers an older firewall that is known to have serious vulnerabilities to remote attacks but is not part of the original list of IP addresses for the engagement. Which of the following is the BEST option for the tester to take?

A. Segment the firewall from the cloud.

B. Scan the firewall for vulnerabilities.

C. Notify the client about the firewall.

D. Apply patches to the firewall.

Buy Now
Questions 12

During passive reconnaissance of a target organization's infrastructure, a penetration tester wants to identify key contacts and job responsibilities within the company. Which of the following techniques would be the most effective for this situation?

A. Social media scraping

B. Website archive and caching

C. DNS lookup

D. File metadata analysis

Buy Now
Questions 13

A penetration tester is taking screen captures of hashes obtained from a domain controller. Which of the following best explains why the penetration tester should immediately obscure portions of the images before saving?

A. To maintain confidentiality of data/information

B. To avoid disclosure of how the hashes were obtained

C. To make the hashes appear shorter and easier to crack

D. To prevent analysis based on the type of hash

Buy Now
Exam Code: PT0-003
Exam Name: CompTIA PenTest+
Last Update: Mar 04, 2025
Questions: 271
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99