Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

PT0-003 CompTIA PenTest+ Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

PT0-003 Practice Questions

CompTIA PenTest+ Exam

Last Update 3 days ago
Total Questions : 298

Dive into our fully updated and stable PT0-003 practice test platform, featuring all the latest PenTest+ exam questions added this week. Our preparation tool is more than just a CompTIA study aid; it's a strategic advantage.

Our free PenTest+ practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about PT0-003. Use this test to pinpoint which areas you need to focus your study on.

PT0-003 PDF

PT0-003 PDF (Printable)
$43.75
$124.99

PT0-003 Testing Engine

PT0-003 PDF (Printable)
$50.75
$144.99

PT0-003 PDF + Testing Engine

PT0-003 PDF (Printable)
$63.7
$181.99
Question # 51

A penetration tester gained a foothold within a network. The penetration tester needs to enumerate all users within the domain. Which of the following is the best way to accomplish this task?

Options:

A.  

pwd.exe

B.  

net.exe

C.  

sc.exe

D.  

msconfig.exe

Discussion 0
Question # 52

A penetration tester needs to scan a remote infrastructure with Nmap. The tester issues the following command:

nmap 10.10.1.0/24

Which of the following is the number of TCP ports that will be scanned?

Options:

A.  

256

B.  

1,000

C.  

1,024

D.  

65,535

Discussion 0
Question # 53

During a preengagement activity with a new customer, a penetration tester looks for assets to test. Which of the following is an example of a target that can be used for testing?

Options:

A.  

API

B.  

HTTP

C.  

IPA

D.  

ICMP

Discussion 0
Question # 54

Which of the following is within the scope of proper handling and most crucial when working on a penetration testing report?

Options:

A.  

Keeping both video and audio of everything that is done

B.  

Keeping the report to a maximum of 5 to 10 pages in length

C.  

Basing the recommendation on the risk score in the report

D.  

Making the report clear for all objectives with a precise executive summary

Discussion 0
Question # 55

Which of the following can an access control vestibule help deter?

Options:

A.  

USB drops

B.  

Badge cloning

C.  

Lock picking

D.  

Tailgating

Discussion 0
Question # 56

Which of the following methods should a physical penetration tester employ to access a rarely used door that has electronic locking mechanisms?

Options:

A.  

Lock picking

B.  

Impersonating

C.  

Jamming

D.  

Tailgating

E.  

Bypassing

Discussion 0
Question # 57

A penetration tester creates a list of target domains that require further enumeration. The tester writes the following script to perform vulnerability scanning across the domains:

line 1: #!/usr/bin/bash

line 2: DOMAINS_LIST = "/path/to/list.txt"

line 3: while read -r i; do

line 4: nikto -h $i -o scan-$i.txt &

line 5: done

The script does not work as intended. Which of the following should the tester do to fix the script?

Options:

A.  

Change line 2 to {"domain1", "domain2", "domain3", }.

B.  

Change line 3 to while true; read -r i; do.

C.  

Change line 4 to nikto $i | tee scan-$i.txt.

D.  

Change line 5 to done < "$DOMAINS_LIST".

Discussion 0
Question # 58

During an internal penetration test, a tester compromises a Windows OS-based endpoint and bypasses the defensive mechanisms. The tester also discovers that the endpoint is part of an Active Directory (AD) local domain.

The tester’s main goal is to leverage credentials to authenticate into other systems within the Active Directory environment.

Which of the following steps should the tester take to complete the goal?

Options:

A.  

Use Mimikatz to collect information about the accounts and try to authenticate in other systems

B.  

Use Hashcat to crack a password for the local user on the compromised endpoint

C.  

Use Evil-WinRM to access other systems in the network within the endpoint credentials

D.  

Use Metasploit to create and execute a payload and try to upload the payload into other systems

Discussion 0
Question # 59

A tester is finishing an engagement and needs to ensure that artifacts resulting from the test are safely handled. Which of the following is the best procedure for maintaining client data privacy?

Options:

A.  

Remove configuration changes and any tools deployed to compromised systems.

B.  

Securely destroy or remove all engagement-related data from testing systems.

C.  

Search through configuration files changed for sensitive credentials and remove them.

D.  

Shut down C2 and attacker infrastructure on premises and in the cloud.

Discussion 0
Question # 60

A penetration tester attempts to run an automated web application scanner against a target URL. The tester validates that the web page is accessible from a different device. The tester analyzes the following HTTP request header logging output:

200; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0

200; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0

No response; POST /login.aspx HTTP/1.1 Host: foo.com; User-Agent: curl

200; POST /login.aspx HTTP/1.1 Host: foo.com; User-Agent: Mozilla/5.0

No response; GET /login.aspx HTTP/1.1 Host: foo.com; User-Agent: python

Which of the following actions should the tester take to get the scans to work properly?

Options:

A.  

Modify the scanner to slow down the scan.

B.  

Change the source IP with a VPN.

C.  

Modify the scanner to only use HTTP GET requests.

D.  

Modify the scanner user agent.

Discussion 0
Get PT0-003 dumps and pass your exam in 24 hours!

Free Exams Sample Questions