CompTIA PenTest+ PT0-003 (V3) Practice Question

A penetration tester is tasked with demonstrating the risk of phishing attacks that can bypass multi-factor authentication (MFA). The goal is to capture an active session token after a user successfully authenticates through a legitimate-looking portal. Which of the following approaches is BEST suited for creating a convincing, functional sign-on page that also intercepts the resulting session token?

  • An exploitation that changes DNS entries for legitimate domains so users unknowingly transmit tokens

  • A method relying on embedded script tags in the page to disclose session data from the user's browser

  • A technique that hosts a covert proxy site mirroring the genuine login interface and relays user traffic to acquire authentication tokens

  • An approach using a local hash extraction utility to retrieve encrypted credentials from a target's workstation

CompTIA PenTest+ PT0-003 (V3)
Attacks and Exploits
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $51
$425.00 $374.00
SAVE $57
CompTIA PenTest+ Voucher with Retake
v3 / PT0-003
Includes Retake
$474.00 $417.00
Bash, the Crucial Exams Chat Bot
AI Bot