CompTIA PT0-003 Practice Test
Prepare smarter and boost your chances of success with our CompTIA PT0-003 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use PT0-003 practice exam are 40–50% more likely to pass on their first attempt.
Start practicing today and take the fast track to becoming CompTIA PT0-003 certified.
1880 already prepared
Updated On : 11-Sep-202588 Questions
4.8/5.0
In a cloud environment, a security team discovers that an attacker accessed confidential information that was used to configure virtual machines during their initialization. Through which of the following features could this information have been accessed?
A. IAM
B. Block storage
C. Virtual private cloud
D. Metadata services
Explanation
In cloud environments (like AWS, Azure, and GCP), metadata services provide a mechanism for a virtual machine instance to access information about itself. This is a legitimate feature designed to help with configuration management. For example, an instance can query its own IP address, hostname, security credentials, and most critically, user-data.
User-data is a script or configuration file that is passed to the instance at launch time. It is often used to automate software installation and configuration. If this script contains sensitive information like API keys, database passwords, or other secrets, it can be a major security risk.
The vulnerability occurs when the metadata service is accessible from within the instance without proper restrictions. An attacker who gains a foothold on the VM (e.g., through a web application vulnerability) can simply curl the metadata service endpoint (e.g., http://169.254.169.254/ on AWS) and retrieve this confidential configuration data.
This scenario directly describes an attacker accessing "confidential information that was used to configure virtual machines during their initialization," which is the primary function of user-data served by the metadata service.
Why the Other Options Are Incorrect
A. IAM (Identity and Access Management):
IAM is a control plane service for managing user permissions and access to cloud resources. While misconfigured IAM roles attached to the VM could be the method the attacker used to gain initial access, the specific data described (VM configuration data) is not stored or retrieved from the IAM service itself. The data was accessed from a feature on the VM.
B. Block storage:
This refers to persistent storage volumes (like Amazon EBS or Azure Disks) that are attached to VMs. Configuration scripts could be stored here improperly, but the question specifies the information was used "during their initialization." This points directly to the initial bootstrapping process, which is handled by metadata/user-data, not a separate block storage volume that is attached after initialization.
C. Virtual private cloud (VPC):
A VPC is a logically isolated network within the cloud. It is the network container in which the VM runs. While network misconfigurations of the VPC might allow an attacker to reach the VM, the VPC itself is not the service that stores or serves the VM's configuration data.
Reference
This attack is a well-documented cloud-specific vulnerability. The OWASP Top 10 for Cloud Security Controls and cloud provider security advisories (like AWS's SSRF advisory) consistently warn about the dangers of exposed metadata services, especially when combined with Server-Side Request Forgery (SSRF) vulnerabilities in web applications.
Which of the following is the most efficient way to infiltrate a file containing data that could be sensitive?
A. Use steganography and send the file over FTP
B. Compress the file and send it using TFTP
C. Split the file in tiny pieces and send it over dnscat
D. Encrypt and send the file over HTTPS
Explanation
The question asks for the most efficient way to infiltrate (exfiltrate) a file. "Efficient" in this context means the method that is most likely to succeed without detection or disruption, balancing speed, reliability, and stealth in a modern network environment.
HTTPS (Hypertext Transfer Protocol Secure) is the standard protocol for secure web traffic. It is ubiquitous and expected on any network.
Encrypting the file before exfiltration provides confidentiality, ensuring the data is unreadable if intercepted.
Combining these two is highly efficient because:
Blends with Normal Traffic:
HTTPS traffic is allowed through almost every firewall and is rarely inspected deeply due to its encrypted nature. It does not stand out like other protocols.
Reliable and Fast:
HTTPS is a robust, high-performance protocol designed for transferring data.
Layered Security:
The file encryption provides an additional layer of security beyond the TLS encryption of the HTTPS channel itself.
This method provides the best combination of stealth, reliability, and security.
Why the Other Options Are Incorrect
A. Use steganography and send the file over FTP:
Steganography (hiding data within another file) is stealthy, but FTP (File Transfer Protocol) is an old, unencrypted protocol that is often blocked or heavily monitored by firewalls. It is inefficient because it is easily detected and the data is sent in plaintext.
B. Compress the file and send it using TFTP:
TFTP (Trivial File Transfer Protocol) is even more problematic than FTP. It uses UDP, is connectionless, and is almost exclusively used for internal network device configurations. It is highly unusual for general internet traffic and would be immediately flagged as suspicious, making it very inefficient for exfiltration.
C. Split the file in tiny pieces and send it over dnscat:
Tools like dnscat use DNS tunneling for exfiltration. This can be very stealthy because DNS queries are almost always allowed. However, it is extremely slow and inefficient due to the size limitations of DNS packets. Splitting a file into tiny pieces and sending them as numerous DNS queries is a low-bandwidth, high-latency process, making it one of the least efficient methods in terms of speed and reliability, even if it is stealthy.
Reference
This aligns with the "Data Exfiltration" topic (Domain 4.4) in the PT0-003 exam objectives. The technique of using common, encrypted protocols like HTTPS/SSL to blend exfiltrated data with normal network traffic is a standard method discussed in penetration testing and adversary emulation frameworks like MITRE ATT&CK (Technique T1048.001 - Exfiltration Over Symmetric Encrypted Channel).
A penetration tester is evaluating a SCADA system. The tester receives local access to a workstation that is running a single application. While navigating through the application, the tester opens a terminal window and gains access to the underlying operating system. Which of the following attacks is the tester performing?
A. Kiosk escape
B. Arbitrary code execution
C. Process hollowing
D. Library injection
Explanation
The scenario describes a classic kiosk escape attack. Let's break down the key elements:
Environment:
A SCADA workstation that is running a single application. This is a common security measure to lock down the interface and prevent users from accessing the underlying operating system, effectively turning the workstation into a "kiosk."
Attack Vector:
The tester finds a way within the application itself to open a terminal window (command prompt, shell, etc.).
Result:
The tester gains access to the underlying OS.
This entire process—bypassing the restricted "kiosk" mode to gain unauthorized access to the host system—is the definition of a kiosk escape attack. The vulnerability is often found in the application's features (e.g., a help menu that allows launching a browser, which can then be used to access the local file system) or misconfigurations in the kiosk lockdown software.
Why the Other Options Are Incorrect
B. Arbitrary code execution:
This is a broader term for a vulnerability that allows an attacker to run any code of their choice. While a successful kiosk escape involves executing code (e.g., cmd.exe), the specific goal and context of breaking out of a single-application environment make "kiosk escape" the more precise answer. Arbitrary code execution is the mechanism, but kiosk escape is the attack type.
C. Process hollowing:
This is a specific malware technique where a legitimate process is created in a suspended state, its memory is "hollowed out" and replaced with malicious code, and then it is resumed. This is a method for evading detection, not for breaking out of a kiosk mode.
D. Library injection:
This is another technique where code is injected into a running process by forcing it to load a malicious dynamic-link library (DLL). Like process hollowing, it is a code execution technique but not descriptive of the overall goal of escaping a restricted application environment.
Reference
Kiosk escape is a well-known attack vector in penetration testing, especially in operational technology (OT) environments like SCADA systems where workstations are often locked down. The PenTest+ exam objectives (Domain 3.3: Given a scenario, perform post-exploitation techniques) include understanding attacks against constrained environments, which this scenario perfectly exemplifies.
Which of the following elements in a lock should be aligned to a specific level to allow the key cylinder to turn?
A. Latches
B. Pins
C. Shackle
D. Plug
Explanation
This question describes the core mechanism of a standard pin tumbler lock, which is the most common type of lock.
Inside the lock cylinder, there are two sets of pins: driver pins and key pins.
When no key is inserted, the driver pins are pushed down by springs, obstructing the plug (the part that turns) from rotating.
When the correct key is inserted, the ridges and valleys on the key push the key pins up to a specific height.
This action aligns the gap between the key pins and driver pins perfectly with the edge of the plug (a point called the shear line).
Once all pins are aligned at the shear line, the plug can rotate freely, allowing the lock to open.
Therefore, the pins are the elements that must be aligned to a specific level to allow the key cylinder to turn.
Why the Other Options Are Incorrect
A. Latches:
A latch is the bolt or mechanism that extends from the lock into the door frame to secure the door. It is moved by the turning of the cylinder, but the pins must be aligned first for the cylinder to turn. The latches themselves are not aligned inside the cylinder.
C. Shackle:
This is the U-shaped part of a padlock that swings out to open. It is released when the internal locking mechanism (which is activated by the pins aligning) is disengaged. The shackle is not aligned inside the cylinder.
D. Plug:
The plug is the entire key cylinder that turns. The question asks for the elements within the plug that need to be aligned to allow the plug to turn. The plug itself is the object that rotates as a result of the alignment.
Reference
This is a fundamental principle of lock picking, which is a topic within the "Physical Security Attacks" area of penetration testing. Understanding how pin tumbler locks work is the first step in learning techniques like single-pin picking or raking. This knowledge falls under the broader objective of assessing physical security controls.
A tester performs a vulnerability scan and identifies several outdated libraries used within the customer SaaS product offering. Which of the following types of scans did the tester use to identify the libraries?
A. IAST
B. SBOM
C. DAST
D. SAST
Explanation
The key detail in the question is that the tester identified outdated libraries used within the customer SaaS product. This points directly to an analysis of the software's components and dependencies.
SBOM (Software Bill of Materials):
An SBOM is a nested inventory of all components, libraries, and modules that are used to build a software application. It is essentially a list of "ingredients." Vulnerability scanners that generate or analyze SBOMs can directly compare the versions of the listed libraries against databases of known vulnerabilities (like the National Vulnerability Database) to flag outdated and vulnerable components. This is the most direct way to identify this specific issue.
Why the Other Options Are Incorrect
A. IAST (Interactive Application Security Testing):
IAST tools run inside the application (e.g., using an agent) while it is being tested (e.g., by DAST or manual testing). They analyze the code from within during runtime to find vulnerabilities. While they can find issues related to library use in context, they are not primarily designed for the comprehensive inventory of components that an SBOM provides.
C. DAST (Dynamic Application Security Testing):
DAST tools test a running application from the outside, like a black-box test. They simulate attacks and analyze responses. A DAST scan might indirectly discover an outdated library if it exploits a known vulnerability that causes an error revealing the library version. However, it does not systematically inventory all libraries; it only finds ones with exploitable vulnerabilities that are triggered during the test.
D. SAST (Static Application Security Testing):
SAST tools analyze an application's source code, bytecode, or binary code without running it. They are excellent for finding coding flaws but are generally not as effective as dedicated dependency checkers or SBOM tools at comprehensively listing every third-party library version used, especially if the libraries are compiled into binaries.
Reference
The use of SBOMs has become a critical practice in modern software development and security, especially with initiatives like the U.S. Cybersecurity Executive Order focusing on software supply chain security. SBOM tools (e.g., OWASP Dependency-Check, Snyk, etc.) are specifically designed to identify outdated and vulnerable libraries within a codebase, which aligns perfectly with the scenario described.
A penetration tester needs to complete cleanup activities from the testing lead. Which of the following should the tester do to validate that reverse shell payloads are no longer running?
A. Run scripts to terminate the implant on affected hosts.
B. Spin down the C2 listeners.
C. Restore the firewall settings of the original affected hosts.
D. Exit from C2 listener active sessions.
Explanation
The question asks how to validate that reverse shell payloads are no longer running. The key word is "validate." This means taking active steps to confirm the persistent payload (the implant) has been removed from the compromised systems.
Simply shutting down your own infrastructure (the Command and Control, or C2, server) does not prove the implant is gone from the target host. The implant process may still be running, attempting to call back to a listener that is no longer there.
The only way to validate that the payload is no longer running is to actively terminate the process on the target host itself. This is typically done by running a cleanup script or command (e.g., using the implant itself to delete its files and stop its process) that was prepared as part of the engagement plan.
This action directly addresses the root cause—the running process on the target—and provides proof that it has been stopped.
Why the Other Options Are Incorrect
B. Spin down the C2 listeners.
This is a necessary step to stop accepting new connections, but it does not validate that the implant is gone from the target hosts. The payload could still be active on the target, and if the listener were restarted, the connection might re-establish.
C. Restore the firewall settings of the original affected hosts.
While it's good practice to revert any firewall changes made during the test, this does not address the running reverse shell process already on the host. The reverse shell initiates an outbound connection, which is often allowed by default firewall rules. Restoring settings doesn't terminate the existing process.
D. Exit from C2 listener active sessions.
This merely closes the management console's view of the active session. It does not terminate the implant process running on the target host. The session might automatically re-establish if the implant is persistent.
Reference
Proper cleanup and remediation verification are critical components of a professional penetration test, as outlined in the PenTest+ exam objectives (Domain 5.0: Reporting and Communication). The goal is to leave the client's environment in its pre-test state. Validating that all artifacts, especially persistent payloads, have been removed is a fundamental part of this process.
A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?
A. OS fingerprinting
B. Attack path mapping
C. Service discovery
D. User enumeration
Explanation
The command is: nmap -sV -sT -p- 192.168.1.0/24
Let's decode the flags:
-sV: This is the Version detection flag. It probes open ports to determine the service/application name and version number.
-sT: This specifies a TCP Connect scan. It completes the full TCP 3-way handshake, making it a reliable but slower and more noticeable scan.
-p-: This tells Nmap to scan all 65,535 ports on each target, instead of just the default ~1,000 most common ports.
192.168.1.0/24:
This is the target, which is the entire 192.168.1.0 subnet.
The most likely purpose of this scan is to thoroughly discover what services are running on the network. The combination of scanning all ports (-p-) and then performing version detection (-sV) on any that are open is a classic and comprehensive service discovery technique. The goal is to build a complete inventory of available services and their versions.
Why the Other Options Are Incorrect
A. OS fingerprinting:
OS fingerprinting requires the -O flag in Nmap. This command does not include that flag, so it is not attempting to identify the operating systems of the target hosts.
B. Attack path mapping:
This is a high-level strategic goal that might use the results of a service discovery scan, but it is not the direct purpose of this specific Nmap command. Attack path mapping involves analyzing the discovered services, vulnerabilities, and network relationships to plan an attack. This command is just one data-gathering step in that process.
D. User enumeration:
Nmap is not primarily a tool for enumerating users on a system. User enumeration is typically done with specialized tools like enum4linux for SMB or rpcclient against RPC services, once those specific services have been discovered. This Nmap command might find the ports those services run on, but it doesn't perform user enumeration itself.
Reference
This command is a standard example from the "Network Scanning" phase of penetration testing. It aligns with the PenTest+ objective of understanding how to use various tools for reconnaissance and discovery. The -sV flag is explicitly for service/version detection, which is the core of service discovery.
A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?
A. route.exe print
B. netstat.exe -ntp
C. net.exe commands
D. strings.exe -a
Explanation
After gaining initial access to a Windows system, the net.exe command is the primary native tool for enumerating information about the local system and domain, especially concerning users and groups.
Key net.exe commands for user enumeration include:
net user - Lists local user accounts on the machine.
net user [username] - Provides detailed information about a specific user account.
net localgroup - Lists local groups.
net localgroup [groupname] - Lists members of a specific local group (e.g., Administrators).
net group /domain - (If the machine is domain-joined) Lists domain groups.
net user /domain - (If domain-joined) Lists domain users.
These commands use the access token of the currently logged-in user to query the system, making them ideal for enumeration with "native operating system credentials."
Why the Other Options Are Incorrect
A. route.exe print:
This command is used to display and manipulate the local machine's IP routing table. It is used for network configuration, not for enumerating users.
B. netstat.exe -ntp:
The netstat command displays active network connections (-n for numerical addresses, -t for TCP, -p to show the process identifier). While extremely useful for network reconnaissance and seeing what the system is connected to, it does not provide information about local or domain user accounts.
D. strings.exe -a:
The strings command searches a binary file for human-readable text sequences. It is a forensic tool used to extract information like passwords or URLs from executable files. It is not a tool for querying the operating system's user database.
Reference
The use of net.exe commands for local and domain enumeration is a fundamental technique in Windows post-exploitation. It falls under the PenTest+ exam objectives for post-exploitation (Domain 3.3: Given a scenario, perform post-exploitation techniques), specifically for local and domain user enumeration. It is the go-to native tool for this purpose.
A penetration tester has found a web application that is running on a cloud virtual machine instance. Vulnerability scans show a potential SSRF for the same application URL path with an injectable parameter. Which of the following commands should the tester run to successfully test for secrets exposure exploitability?
A. curl
B. curl '?param=http://127.0.0.1/etc/passwd'
C. curl '?param=;script;alert(1)\;script;/'
D. \;curl \?param=http://127.0.0.1/
Explanation
The scenario describes an SSRF vulnerability in a cloud VM instance. The key to "testing for secrets exposure" in this context is to exploit the SSRF to make the web server make a request to the cloud provider's instance metadata service.
Cloud Metadata Service:
Cloud providers like AWS, Azure, and GCP have a special, non-routable IP address (e.g., 169.254.169.254 for AWS) that only an instance can use to query its own configuration data. This metadata can include highly sensitive secrets like access keys, security credentials, and user-data scripts passed at launch.
SSRF Exploitation:
If the web application is vulnerable to SSRF and does not properly validate the param input, an attacker can trick the server into fetching data from its own metadata service. Since the request originates from the server itself, it is allowed to access this sensitive endpoint.
The command in option A directly tests this by attempting to retrieve the root of the metadata service, which is the first step in enumerating available secrets. Success would confirm the vulnerability is exploitable for secrets exposure.
Why the Other Options Are Incorrect
B. curl '?param=http://127.0.0.1/etc/passwd':
This tests for a different type of SSRF—accessing local files via the file:// protocol or Local File Inclusion (LFI). While this is a valid test, the question specifically asks about "secrets exposure" in a cloud environment. The most critical secrets in a cloud VM are typically in the metadata service, not necessarily in /etc/passwd. This test is less specific to the cloud scenario.
C. curl '?param=;script;alert(1);script;/':
This is a test for Cross-Site Scripting (XSS), not SSRF. It attempts to inject client-side scripts into the page, which is unrelated to forcing the server to make a network request.
D. ;curl ?param=http://127.0.0.1/:
This syntax is incorrect and would not work as a valid curl command or SSRF payload. The escaping of the semicolon and question mark is nonsensical in this context.
Reference
Exploiting SSRF to access the cloud instance metadata service is a well-documented and critical attack vector. It is a primary example in the OWASP Top 10 under the SSRF category (A10:2021-Server-Side Request Forgery) and is a key testing scenario for cloud penetration tests. The specific IP address 169.254.169.254 is associated with the AWS Instance Metadata Service (IMDS).
A penetration tester plans to conduct reconnaissance during an engagement using readily available resources. Which of the following resources would most likely identify hardware and software being utilized by the client?
A. Cryptographic flaws
B. Protocol scanning
C. "Cached pages
D. Job boards
Explanation
The key phrase in the question is "readily available resources," which points to passive reconnaissance techniques that do not involve directly interacting with the target's systems.
Job Boards:
Companies often post detailed job listings on sites like LinkedIn, Indeed, or their own career pages. These listings can be a goldmine of information about the company's technology stack. For example, a job posting for a "Senior VMware Administrator" or a "Python Django Developer" strongly indicates the company uses VMware for virtualization and the Django framework for web development. This is a highly effective, passive way to identify the hardware and software in use.
Why the Other Options Are Incorrect
A. Cryptographic flaws:
Identifying cryptographic flaws requires actively scanning and analyzing the target's services (e.g., testing for weak ciphers on an HTTPS server). This is an active reconnaissance technique, not a passive one using "readily available" public resources.
B. Protocol scanning:
Protocol scanning (e.g., with Nmap) involves sending packets to the target's network to elicit responses that reveal services and operating systems. This is a classic active reconnaissance technique and directly interacts with the target's infrastructure.
C. "Cached pages":
While search engine caches (like Google's "Cached" link) can be used for passive reconnaissance to view a website's previous content, they are less likely to systematically reveal the specific hardware and software being utilized. They are more useful for uncovering old, potentially sensitive content that has been removed from the live site. Job boards are a much more direct and reliable source for technology stack intelligence.
Reference
This technique falls under Open-Source Intelligence (OSINT) gathering, which is a critical part of the initial reconnaissance phase (Domain 1.0) of a penetration test. Using job postings to build a picture of a target's IT environment is a standard and highly effective passive method discussed in OSINT methodologies.
Page 1 out of 9 Pages |
Master Penetration Testing with PenTest+ PT0-003
CompTIA PenTest+ PT0-003 certification validates your hands-on penetration testing and vulnerability assessment skills. Our realistic practice tests prepare you for the latest exam version, helping you develop the offensive security mindset needed for todays cybersecurity challenges.
Exam Code: PT0-003
Exam Name: CompTIA Pentest+ Exam
Certification Name: Pentest+
Certification Provider: CompTIA
Exam Questions: 85
Type of Questions: MCQs and performance-based
Exam Time: 165 minutes
Passing Score: 700
What Does the PT0-003 Exam Cover?
PT0-003 exam validates hands-on skills and knowledge in key areas such as:
Planning and Scoping — Defining test boundaries, compliance considerations, and client communication
Information Gathering and Vulnerability Scanning — Reconnaissance techniques, vulnerability identification, and analysis
Attacks and Exploits — Performing exploits against various platforms, evasion techniques, and post-exploitation activities
Reporting and Communication — Writing clear reports, recommending remediation, and presenting findings to stakeholders
Tools and Code Analysis — Using tools for scripting, automation, and analyzing scripts and code for vulnerabilities
Unlike purely theoretical exams, PenTest+ emphasizes practical, performance-based scenarios where candidates demonstrate real-world pentesting skills.
PenTest+ PT0-003 Exam Breakdown
Domain | Weighting |
---|---|
Planning & Scoping | 14% |
Information Gathering | 15% |
Vulnerability Scanning | 15% |
Attacks & Exploits | 30% |
Reporting & Communication | 16% |
Tools & Code Analysis | 10% |
Who Should Take PenTest+ PT0-003?
This certification is ideal for:
Penetration testers seeking formal validation
Security consultants expanding service offerings
Red team members demonstrating skills
Ethical hackers pursuing career advancement
Cybersecurity analysts transitioning to offensive roles
Recommended Experience:
3-4 years of hands-on security experience
Network+ and Security+ knowledge (recommended)
Familiarity with scripting (Python, Bash, PowerShell)
These practice questions were the missing piece in my study plan!
As an aspiring penetration tester, I knew the PT0-003 exam would be challenging—but I did not realize how much hands-on, scenario-based thinking it required until I started studying. Textbook knowledge alone was not enough. That is when I discovered these PT0-003 practice questions, and they completely changed my approach. The questions mirrored real-world penetration testing workflows, from reconnaissance and vulnerability scanning to exploitation and reporting. Each scenario forced me to think like an attacker, not just memorize terms.What stood out most were the detailed explanations, which broke down not only the correct answers but also the reasoning behind common pitfalls. I especially appreciated the focus on tools like Nmap, Metasploit, and Burp Suite, as well as the emphasis on compliance and legal considerations—topics that are critical in real engagements. By the time exam day arrived, I felt prepared to tackle even the most situational questions. This practice test didnt just help me pass—they made me a better pen tester. If you want to truly understand the material, not just scrape by, this is the resource you need.
Jordan L., Cybersecurity Consultant