Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CompTIA > CompTIA Certifications > PT0-003 > PT0-003 Online Practice Questions and Answers

PT0-003 Online Practice Questions and Answers

Questions 4

A penetration tester plans to conduct reconnaissance during an engagement using readily available resources. Which of the following resources would most likely identify hardware and software being utilized by the client?

A. Cryptographic flaws

B. Protocol scanning

C. Cached pages

D. Job boards

Buy Now

Correct Answer: D

To conduct reconnaissance and identify hardware and software used by a client, job boards are an effective resource. Companies often list the technologies they use in job postings to attract qualified candidates. These listings can provide

valuable insights into the specific hardware and software platforms the client is utilizing.

Reconnaissance:

Job Boards:

Examples of Job Boards:

Pentest References:

OSINT (Open Source Intelligence): Using publicly available sources to gather information about a target.

Job boards are a key source of OSINT, providing indirect access to the internal technologies of a company.

This information can be used to tailor subsequent phases of the penetration test, such as vulnerability scanning and exploitation, to the specific technologies identified. By examining job boards, a penetration tester can gain insights into the

hardware and software environments of the target, making this a valuable reconnaissance tool.

Questions 5

During a security assessment for an internal corporate network, a penetration tester wants to gain unauthorized access to internal resources by executing an attack that uses software to disguise itself as legitimate software. Which of the following host-based attacks should the tester use?

A. On-path

B. Logic bomb

C. Rootkit

D. Buffer overflow

Buy Now

Correct Answer: C

A rootkit is a type of malicious software designed to provide an attacker with unauthorized access to a computer system while concealing its presence. Rootkits achieve this by modifying the host's operating system or other software to hide

their existence, allowing the attacker to maintain control over the system without detection.

Definition and Purpose:

Mechanisms of Action:

Detection and Prevention:

Real-World Examples:

References from Pentesting Literature:

Step-by-Step ExplanationReferences:

Penetration Testing - A Hands-on Introduction to Hacking HTB Official Writeups on sophisticated attacks

Questions 6

A penetration tester needs to collect information over the network for further steps in an internal assessment. Which of the following would most likely accomplish this goal?

A. ntlmrelayx.py -t 192.168.1.0/24 -1 1234

B. nc -tulpn 1234 192.168.1.2

C. responder.py -I eth0 -wP

D. crackmapexec smb 192.168.1.0/24

Buy Now

Correct Answer: C

To collect information over the network, especially during an internal assessment, tools that can capture and analyze network traffic are essential. Responder is specifically designed for this purpose, and it can capture NTLM hashes and other

credentials by poisoning various network protocols. Here's a breakdown of the options:

Option A: ntlmrelayx.py -t 192.168.1.0/24 -1 1234 Option B: nc -tulpn 1234 192.168.1.2

Option C: responder.py -I eth0 -wP

Option D: crackmapexec smb 192.168.1.0/24

References from Pentest:

Anubis HTB: Highlights the use of Responder to capture network credentials and hashes during internal assessments.

Horizontall HTB: Demonstrates the effectiveness of Responder in capturing and analyzing network traffic for further exploitation.

Questions 7

During a penetration test, a tester attempts to pivot from one Windows 10 system to another Windows system. The penetration tester thinks a local firewall is blocking connections. Which of the following command-line utilities built into Windows is most likely to disable the firewall?

A. certutil.exe

B. bitsadmin.exe

C. msconfig.exe

D. netsh.exe

Buy Now

Correct Answer: D

Understanding netsh.exe:

Disabling the Firewall:

netsh advfirewall set allprofiles state off

Usage in Penetration Testing:

References from Pentesting Literature:

References:

Penetration Testing - A Hands-on Introduction to Hacking HTB Official Writeups

Questions 8

Which of the following components should a penetration tester include in an assessment report?

A. User activities

B. Customer remediation plan

C. Key management

D. Attack narrative

Buy Now

Correct Answer: D

An attack narrative provides a detailed account of the steps taken during the penetration test, including the methods used, vulnerabilities exploited, and the outcomes of each attack. This helps stakeholders understand the context and

implications of the findings.

Components of an Assessment Report:

Importance of Attack Narrative:

References from Pentesting Literature:

Step-by-Step ExplanationReferences:

Penetration Testing - A Hands-on Introduction to Hacking HTB Official Writeups

Questions 9

A penetration tester is conducting an authorized, physical penetration test to attempt to enter a client's building during non-business hours. Which of the following are MOST important for the penetration tester to have during the test? (Choose two.)

A. A handheld RF spectrum analyzer

B. A mask and personal protective equipment

C. Caution tape for marking off insecure areas

D. A dedicated point of contact at the client

E. The paperwork documenting the engagement

F. Knowledge of the building's normal business hours

Buy Now

Correct Answer: DE

Always carry the contact information and any documents stating that you are approved to do this.

Questions 10

A penetration tester downloaded the following Perl script that can be used to identify vulnerabilities in network switches. However, the script is not working properly.

Which of the following changes should the tester apply to make the script work as intended?

A. Change line 2 to $ip= 10.192.168.254;

B. Remove lines 3, 5, and 6.

C. Remove line 6.

D. Move all the lines below line 7 to the top of the script.

Buy Now

Correct Answer: B

https://www.asc.ohio-state.edu/lewis.239/Class/Perl/perl.html Example script:

#!/usr/bin/perl

$ip=$argv[1];

attack($ip);

sub attack {

print("x");

}

Questions 11

A penetration tester is performing a vulnerability scan on a large ATM network. One of the organization's requirements is that the scan does not affect legitimate clients' usage of the ATMs. Which of the following should the tester do to best meet the company's vulnerability scan requirements?

A. Use Nmap's -T2 switch to run a slower scan and with less resources.

B. Run the scans using multiple machines.

C. Run the scans only during lunch hours.

D. Use Nmap's -host-timeout switch to skip unresponsive targets.

Buy Now

Correct Answer: A

Questions 12

A penetration tester is taking screen captures of hashes obtained from a domain controller. Which of the following best explains why the penetration tester should immediately obscure portions of the images before saving?

A. To maintain confidentiality of data/information

B. To avoid disclosure of how the hashes were obtained

C. To make the hashes appear shorter and easier to crack

D. To prevent analysis based on the type of hash

Buy Now

Correct Answer: A

When a penetration tester captures screen images that include hashes from a domain controller, obscuring parts of these images before saving is crucial to maintain the confidentiality of sensitive data. Hashes can be considered sensitive information as they represent a form of digital identity for users within an organization. Revealing these hashes in full could lead to unauthorized access if the hashes were to be cracked or otherwise misused by malicious actors. By partially obscuring the images, the penetration tester ensures that the data remains confidential and reduces the risk of compromising user accounts and the integrity of the organization's security posture.

Questions 13

Which of the following best explains why communication is a vital phase of a penetration test?

A. To discuss situational awareness

B. To build rapport with the emergency contact

C. To explain the data destruction process

D. To ensure the likelihood of future assessments

Buy Now

Correct Answer: A

Communication is a vital phase of a penetration test to ensure all parties involved are aware of the test's progress, findings, and any potential impact on business operations. Discussing situational awareness involves sharing real-time insights about the security posture, any vulnerabilities found, and potential risks. This enables the organization to make informed decisions, mitigate risks promptly, and ensure the test aligns with business objectives and constraints.

Exam Code: PT0-003
Exam Name: CompTIA PenTest+
Last Update: Jun 06, 2025
Questions: 272

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.