CompTIA PenTest+ PT0-003 (V3) Practice Question

During an internal penetration test, EDR telemetry shows the binary C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe launching a temporary file named SalesReport.csproj from the tester's %TEMP% directory. Moments later, an outbound HTTPS connection to the test team's command-and-control server is recorded, but no new executables are written to disk. Which living-off-the-land technique most likely enabled the payload to run unnoticed?

  • Invoking regsvr32.exe with a /i switch to run a malicious scriptlet hosted on a remote URL.

  • Calling rundll32.exe to invoke an exported function from a rogue DLL placed in %TEMP%.

  • Using certutil.exe to download and base64-decode a remote payload before execution.

  • Abusing msbuild.exe to compile and execute malicious code contained inside a crafted project file.

CompTIA PenTest+ PT0-003 (V3)
Post-exploitation and Lateral Movement
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $51
$425.00 $374.00
SAVE $57
CompTIA PenTest+ Voucher with Retake
v3 / PT0-003
Includes Retake
$474.00 $417.00
Bash, the Crucial Exams Chat Bot
AI Bot