CompTIA PenTest+ PT0-003 (V3) Practice Question

After gaining SYSTEM-level access on a Windows workstation during a penetration test, you need to harvest credentials that are currently stored in RAM so they can be reused on other hosts. Which action will BEST achieve this objective?

  • Perform an LLMNR/NBT-NS poisoning attack on the local subnet to capture password hashes from network traffic.

  • Copy the SAM and SYSTEM registry hives and crack the extracted NTLM hashes offline.

  • Dump the LSASS process with a credential-dumping tool such as Mimikatz or Pypykatz, then parse the dump for passwords and hashes.

  • Search each user profile for browser password stores and export any saved credentials.

CompTIA PenTest+ PT0-003 (V3)
Post-exploitation and Lateral Movement
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $51
$425.00 $374.00
SAVE $57
CompTIA PenTest+ Voucher with Retake
v3 / PT0-003
Includes Retake
$474.00 $417.00
Bash, the Crucial Exams Chat Bot
AI Bot