CompTIA PenTest+ PT0-003 (V3) Practice Question

A penetration-testing team operating inside a Windows domain captures several NTLMv2 challenge-response pairs with Responder from a help-desk workstation. The handshake belongs to an account that is a local administrator on multiple file servers where sensitive data is stored. The testers verify that SMB signing is disabled on the target server and want to reuse the captured authentication immediately-without cracking the hash-to open an interactive shell on the server. They decide to remain inside the Python-based Impacket toolkit. Which action will best achieve their objective?

  • Relay the captured NTLM handshake to the file server with ntlmrelayx.py and execute a command once the session is established

  • Request a fraudulent certificate from Active Directory Certificate Services and import it to impersonate the technician over Kerberos

  • Poison NBNS or DNS responses again to coerce additional hosts to connect to a rogue SMB share for new hash collection

  • Forge a golden Kerberos ticket using the technician's NT hash and inject it into LSASS on the attack box

CompTIA PenTest+ PT0-003 (V3)
Attacks and Exploits
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $51
$425.00 $374.00
SAVE $57
CompTIA PenTest+ Voucher with Retake
v3 / PT0-003
Includes Retake
$474.00 $417.00
Bash, the Crucial Exams Chat Bot
AI Bot