CompTIA PenTest+ Practice Test (PT0-003)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-003 (V3) Information
CompTIA PenTest+ (PT0-003) is a professional cybersecurity certification designed for practitioners focusing on penetration testing and vulnerability assessment. It is an intermediate-level exam in CompTIA’s cybersecurity pathway, typically pursued after foundational certifications like Security+, and serves as the offensive or “red team” counterpart to the defensive CySA+ certification. The latest version (exam code PT0-003) updates the content to include modern technologies and threats, such as cloud and mobile environments, to ensure it remains relevant in today’s landscape. Below, we provide an overview of the exam structure, the key benefits of earning PenTest+ certification, and practical tips for studying and preparation.
Exam Structure and Format
The PenTest+ PT0-003 exam tests a broad range of penetration testing knowledge and skills. The exam consists of up to 90 questions in a 165-minute session. Questions are a mix of multiple-choice and performance-based items, meaning candidates must not only answer conceptual questions but also perform simulated penetration testing tasks. The exam is scored on a scale of 100–900, with a passing score of 750. CompTIA recommends that candidates have about 3–4 years of hands-on experience in information security or a related field before attempting this exam.
Exam Domains: The PenTest+ PT0-003 objectives are divided into five domains, each representing a key subject area and a percentage of the exam coverage:
- Engagement Management – 13%
- Reconnaissance and Enumeration – 21%
- Vulnerability Discovery and Analysis – 17%
- Attacks and Exploits – 35%
- Post-Exploitation and Lateral Movement – 14%
This structure ensures that the exam covers the entire penetration testing process end-to-end, from initial planning through exploitation and reporting. Because the exam includes performance-based questions, candidates should be prepared to perform tasks such as using tools or analyzing attack outputs in a simulated environment.
Benefits of Obtaining the PenTest+ Certification
Earning the CompTIA PenTest+ certification can significantly boost a cybersecurity professional’s career progression, especially for those specializing in offensive security roles. PenTest+ is globally recognized and even approved by the U.S. Department of Defense as a baseline certification for several cybersecurity job categories, underscoring its credibility in the industry.
One of the standout benefits of PenTest+ is its emphasis on practical skills. Unlike some certifications that are purely theoretical, PenTest+ includes hands-on, performance-based evaluation. This means certified individuals have proven they can perform real-world penetration testing tasks – planning engagements, exploiting vulnerabilities, and then analyzing and reporting the results – not just answer questions about them.
Professionally, PenTest+ opens doors to roles such as penetration tester, vulnerability assessment analyst, security analyst, and more. These roles are in high demand as organizations seek to bolster their defenses with skilled ethical hackers. Achieving PenTest+ demonstrates to employers that you possess a well-rounded skill set: you can identify weaknesses, exploit them to gauge impact, and recommend mitigations. This can make you a strong candidate for promotions or new job opportunities in the cybersecurity field.
Study and Preparation Tips
Preparing for the PenTest+ PT0-003 requires a combination of knowledge review and hands-on practice. Here are some vendor-neutral tips to help you get ready for the exam:
Review the Official Objectives: Start by downloading the CompTIA PenTest+ PT0-003 exam objectives and use them as a checklist. Make sure you understand each topic listed in the five domains. This ensures you cover all required knowledge areas, from engagement planning to post-exploitation processes.
Build Hands-On Skills: Given the exam’s practical components, set up a lab environment (using virtual machines or cloud instances) to practice penetration testing techniques. Work with common tools and frameworks like Nmap, Metasploit, Wireshark, and Burp Suite to perform scanning, exploitation, password cracking, and other tasks.
Understand Concepts in Context: Don’t just memorize definitions – learn how to apply concepts in real scenarios. The exam often presents scenario-based questions that require critical thinking to identify the best solution or root cause rather than straightforward recall.
Practice Time Management: You’ll have 165 minutes for a maximum of 90 questions, some of which may be complex tasks. Practice solving questions under timed conditions. A common strategy is to quickly answer all the multiple-choice questions first, then allocate remaining time to the performance-based tasks.
Take Practice Exams: Utilize reputable practice exams to test your knowledge and readiness. Practice tests help identify your weak areas and familiarize you with the exam format.
Study Reporting and Best Practices: Remember that penetration testing isn’t just about hacking into systems – it’s also about documenting findings and recommending fixes. Be prepared for questions on writing reports, communicating results to stakeholders, and adhering to legal/ethical standards.
By following these preparation strategies and thoroughly covering the exam domains, you’ll build both the knowledge and the practical know-how needed to succeed on the PenTest+ PT0-003 exam. Achieving this certification not only validates your skills in penetration testing and vulnerability management but also positions you for advancement in the booming field of cybersecurity.

Free CompTIA PenTest+ PT0-003 (V3) Practice Test
- 20 Questions
- Unlimited
- Engagement ManagementReconnaissance and EnumerationVulnerability Discovery and AnalysisAttacks and ExploitsPost-exploitation and Lateral Movement
A security analyst is investigating a potential data exfiltration event. The analyst discovers that several large image files were recently transferred to an external server. While the images appear normal, a binary analysis reveals that the least significant bits of the pixel data across the images contain structured, non-image data. Which data hiding technique does this evidence suggest?
DNS tunneling
Browser-based keylogging
Alternate data streams
Steganography
Answer Description
Steganography is the practice of concealing data within another file, such as an image. A common method, Least Significant Bit (LSB) steganography, involves altering the last bit of each pixel's color data to embed information, which matches the scenario. Alternate data streams attach hidden data to a file within the NTFS filesystem but do not alter the file's internal content. DNS tunneling exfiltrates data via DNS queries. Browser-based keylogging captures user input and is not a data hiding technique for files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is steganography in cybersecurity?
How can steganography be detected?
What is the difference between steganography and cryptography?
A consultant is hired to scan a large multi-tenant site for hidden wireless devices. The client requests a solution that can passively capture data across many channels, reducing the likelihood of detection. Which approach satisfies this need?
Manually connect to each broadcast to confirm suspect activity
Initiate repeated deauthentication transmissions to reveal hidden beacons
Use Kismet to monitor channels quietly for unauthorized signals
Attempt numerous connection requests to detect concealed networks
Answer Description
Kismet is a passive scanning system that does not inject traffic, minimizing exposure while collecting data across several channels. The other options involve access-point interactions such as deauthentication or connection attempts, which risk detection or miss dormant devices that do not respond to active scans.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Kismet and how does it work?
Why is passive scanning preferred over active scanning in this scenario?
What are hidden wireless devices and why are they a security concern?
During a penetration test, you capture traffic with a rogue SMB listener. After a domain administrator's workstation automatically attempts to authenticate, you forward the NTLM challenge-response messages to an internal file server and gain a shell without cracking any hashes. Which attack technique did you perform?
Brute-force attack
Replay attack
Pass-the-hash attack
Relay attack
Answer Description
This scenario is a relay attack (specifically NTLM relay). The attacker sits in the communication path and forwards an ongoing authentication handshake to another host in real time, allowing access without knowing the secret. Pass-the-hash reuses a previously obtained hash rather than a live handshake, a replay attack re-sends recorded packets at a later time, and a brute-force attack guesses many credential combinations instead of relaying legitimate ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a session hijacking attack?
How does forwarding handshake data exploit system vulnerabilities?
How can encryption protocols prevent session hijacking?
A firm with global clients wants to follow a broad legal requirement that enforces protections for individuals' personal data and privacy rights across multiple jurisdictions. Which regulation or standard best satisfies these obligations?
Open Source Security Testing Methodology Manual targeting assessment strategies
NIST SP 800-53 emphasizing federal requirements
GDPR reflecting various obligations for individual rights
Payment Card Industry Data Security Standard focusing on transaction oversight
Answer Description
The General Data Protection Regulation (GDPR) is an EU regulation with extraterritorial scope: organizations anywhere in the world that offer goods or services to, or monitor the behavior of, individuals in the EU/EEA must comply. It establishes strict rules on how personal data is collected, processed, and protected, directly safeguarding data-subject rights.
- NIST SP 800-53 provides security and privacy controls primarily for U.S. federal information systems, not a global privacy mandate.
- The Open Source Security Testing Methodology Manual (OSSTMM) is a penetration-testing methodology, not a regulatory requirement for individual rights.
- The Payment Card Industry Data Security Standard (PCI DSS) focuses on securing payment-card transactions, not on comprehensive personal-data rights.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of the GDPR?
How does the GDPR's extraterritorial scope work?
What are the penalties for non-compliance with GDPR?
An organization is decommissioning several file servers that contained highly sensitive client records. To ensure the information cannot be recovered once these servers leave the facility, which approach best prevents later retrieval of the data stored on their drives?
Perform repeated writes of random patterns on the drives using specialized utilities
Detach the drives and record their serial numbers before placing them in off-site storage
Remove the file-system and partition entries with an operating-system command
Peel off labels and barcodes from the drive enclosures
Answer Description
Using specialized wiping utilities to perform repeated overwrites with random or fixed patterns purges residual magnetic traces on hard disks, meeting NIST SP 800-88 media-sanitization guidance. Simply detaching drives for storage, deleting partition metadata, or removing external labels does not eliminate the underlying data and therefore does not reliably prevent forensic recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is performing repeated writes of random patterns effective for data destruction?
What are some commonly used tools for securely wiping drives?
How does data recovery work, and why are labels or partitions irrelevant in preventing it?
During a client engagement, you are asked to identify every page exposed by a site with numerous nested links and dynamic menus. Which method helps aggregate all reachable content throughout the site?
Initiate a zone transfer on the domain to uncover all subdomains and attached folders
Attempt to gather credentials for domain accounts to see if they lead to extra directories
Run broad port scans on the target host to find site pages on open ports
Use an automated tool that fetches each linked reference from discovered pages to reveal additional layers
Answer Description
Following each discovered link allows an automated crawler to navigate through all connected pages, revealing elements that might otherwise be missed by incomplete manual checks. Parsing credentials or performing zone transfers do not uncover the site's internal content in a structured manner, and scanning random ports will not list pages that exist on those ports.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an automated web crawler, and how does it work?
Why wouldn't a zone transfer or port scan reveal a site's pages?
How can dynamic menus and nested links complicate manual page discovery?
A security analyst reviews a web application and discovers account details stored directly in the files. The developer claims there is no concern because the repository is restricted. Which measure best addresses the exposure?
Encrypt the credentials in the code with a static key
Split the encoded credentials into multiple locations so they appear more hidden
Move the credentials to a separate file on the same source repository
Purge commit history and use environment variables instead of storing account details in the code
Answer Description
It is important to remove the credentials from the source files and prevent their presence in historical commits. Sensitive data should be stored outside of a tracked repository, such as in environment variables. Deleting or rewriting the old commits and utilizing environment variables means the credentials are not published in source history. Methods such as static key encryption and obfuscation make the strings harder to detect, but they do not address the fundamental issue of committing sensitive data, which can be retrieved from past commits. Storing credentials in a file on the same repository does not solve the underlying exposure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are environment variables a better choice for storing sensitive data than source code files?
What is commit history in a repository, and why does it need to be purged for sensitive data?
What are the risks of using static key encryption or obfuscation for storing credentials?
During a security review of an application, a tester discovers that malicious actors are altering session tokens so they appear to be legitimate users. Which category from typical threat modeling techniques best describes this activity?
Withholding acknowledgment that an event has taken place
Replacing sensitive data in a database with harmful content
Presenting false credentials to mimic a valid identity
Launching requests to exhaust server capacity
Answer Description
Altering tokens to impersonate a real account exemplifies pretending to be a valid entity. That falls under one of the standard categories from the threat modeling perspective. Other choices involve issues such as modifying data at rest, taking advantage of unprotected communications, or preventing resource availability, which do not focus on masquerading as another user.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are session tokens, and how do they work?
What are common techniques malicious actors use to alter session tokens?
What practices can prevent session token manipulation or misuse?
During a penetration test, a consultant gains administrative access to a critical Windows server. To ensure they can regain this level of access for further assessment even after a scheduled nightly reboot, the consultant needs to establish a persistent backdoor. Which of the following techniques would be most effective for automatically re-establishing a connection after the system restarts?
Set up a job that runs at system boot to launch a network listener
Place injected code in memory for an active session
Modify user environment variables to load remote tools
Remove blocking rules from the local security filters
Answer Description
Scheduling a script that triggers at startup helps the consultant regain access whenever the system restarts. This is a common persistence technique that ensures a program, like a network listener, is launched automatically upon system boot. Removing firewall filters does not ensure sessions survive reboots. Changing user environment variables does not guarantee automatic connections on system start. Injecting code into memory is temporary for that session and does not persist through shutdowns.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a network listener?
How does scheduling a script at system startup ensure persistence?
Why is injecting code into memory not a persistent technique?
A penetration tester finds that a service running with system-level privileges on a Windows host has an unquoted path to its executable, and the path contains spaces. Which of the following is the most direct method to exploit this specific vulnerability for privilege escalation?
Stop the service and overwrite the legitimate service executable with a malicious file.
Modify the HKEY_LOCAL_MACHINE registry hive to change the service's ImagePath to a malicious driver.
Place a malicious executable in a higher-level directory within the service path, with a filename that Windows will execute before the legitimate service binary.
Dump credentials from the LSASS process memory using a post-exploitation tool.
Answer Description
When a service path is unquoted and contains spaces, the Windows operating system attempts to locate the executable by parsing the path from left to right, treating each space as a delimiter. For a path like "C:\Program Files\Example App\service.exe", Windows will first try to run "C:\Program.exe". An attacker can exploit this by placing a malicious executable with a name like "Program.exe" in a writable parent directory (such as C:). When the service starts, the operating system executes the attacker's file with the service's elevated privileges. The other options describe different privilege escalation or post-exploitation techniques that do not directly exploit the unquoted service path flaw.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does an unquoted service path create a privilege escalation vulnerability?
How can penetration testers identify unquoted service paths on a Windows system?
What mitigation techniques can prevent exploitation of unquoted service paths?
During a web-application penetration test, the consultant wants to uncover vulnerabilities by inserting sensors inside the application's runtime environment so that every user-driven request is monitored and correlated with the specific lines of code executed. Which assessment technique best fits this requirement?
Patch-management scanning that reviews Windows registry keys to locate outdated third-party software
Static analysis that inspects source logic before compilation to flag insecure functions
Network reconnaissance that enumerates open ports and banners to profile perimeter services
Interactive analysis that instruments the running application to observe code paths triggered by live traffic
Answer Description
Interactive Application Security Testing embeds instrumentation inside a running application. The agent watches real-time execution and data flow, combining static and dynamic insights. The other options describe static source review, patch/registry scanning, or external network enumeration, none of which instrument code at runtime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Interactive Application Security Testing (IAST)?
How is IAST different from Static Application Security Testing (SAST)?
What are the benefits of using IAST over other testing methods?
A vulnerability scan flags the id parameter of the internal endpoint /api/orders as possible SQL injection. Before including the finding in the final report, the tester wants to independently verify that the parameter is actually exploitable. Which of the following approaches BEST meets the goal of using scripting to validate the scan result?
Import the Nessus finding into Burp Suite and mark it confirmed because both tools report the same issue.
Search the web framework's release notes to see whether SQL injection issues were recently patched.
Create a Python script that loops through tailored SQL-injection payloads, sends them to
/api/orders, and analyzes each HTTP response for errors, time delays, or leaked data.Compare today's Nessus report with archived reports from the previous quarter to look for recurring findings.
Answer Description
Writing and running a short script that repeatedly sends crafted SQL-injection payloads allows the tester to observe error messages, time delays, or unexpected data in the responses-direct evidence that the endpoint is vulnerable. Reviewing old scan reports, vendor release notes, or assuming parity between two scanners does not actively prove exploitation in the current environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SQL Injection?
How can Python be used for vulnerability testing?
What does a time delay in SQL injection verification indicate?
You plan to use netcat to start a listener that accepts inbound requests from a remote system. Which approach most effectively ensures a persistent, detailed environment with real-time insight and an interactive shell for capturing these sessions?
Configure netcat to redirect incoming traffic to a logging utility for archiving all connection information
Launch netcat with a persistent listening mode for the designated port, enabling logs and an interactive prompt
Run netcat in scanning mode on a range of ports and store the list of reachable connections in a file
Set netcat to broadcast packets across the network to reveal service endpoints for statistical analysis
Answer Description
Using netcat in a persistent listening mode with logs provides feedback on every inbound connection and supports interactive communication. The scanning approach would discover reachable ports but not offer a continuous session. Sending data to a logger would collect records without giving a real-time shell. Broadcasting traffic is more suited to identifying available services rather than accepting inbound connections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is persistent listening mode in netcat?
What are the key benefits of using netcat's interactive shell?
How do netcat logging options enhance session tracking?
During an internal security assessment, investigators discovered multiple persistence attempts across several endpoints, indicating sophisticated intrusion. Which resource helps align these methods with recognized threat patterns for improved detection and response?
A catalog specifying retention intervals for archived records
A reference of verified secure coding practices
A device check document covering common misconfigurations
A matrix that categorizes attacker behaviors across numerous vectors
Answer Description
The matrix enumerates tactics, techniques, and procedures (TTPs), linking the discovered methods to known attacker behaviors. This approach reveals how actions were carried out and guides the investigation toward proper countermeasures. A guideline for coding does not classify attacker behaviors. A compliance resource for logging retention aims at legal and policy requirements rather than intrusion methods. A checklist for device settings focuses on misconfiguration issues without mapping to recognized tactics.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the matrix that categorizes attacker behaviors across numerous vectors?
What are TTPs in the context of cybersecurity?
How does the MITRE ATT&CK framework help investigators during a security assessment?
During a security engagement, a consulting group is asked to follow recognized guidelines from a widely respected professional body. Which step best demonstrates alignment with that body’s standards?
Focus on local rules while considering external guidelines as needed
Integrate recognized skill verifications with a code of professional conduct for testers across the organization
Schedule a short staff review that highlights test approaches
Require testers to complete multiple-choice quizzes once a year
Answer Description
Under rigorous guidelines, skill assessments combined with a professional code strengthen both technical credibility and ethical conduct. Short reviews or basic annual quizzes do not guarantee thorough expertise. Narrowing the focus to local requirements may leave out key external best practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a professional code of conduct for testers?
Why are skill assessments important in penetration testing?
What are recognized guidelines in penetration testing?
While investigating a machine as part of your assessment, you identify a Windows service path referencing an executable located in a folder with a space in the name, but the path is not enclosed in quotes. Which step triggers escalated privileges in this scenario?
Set up a new environment variable that points the service to a different directory
Replace the legitimate registry subkey for the service with a path to an alternate script
Place a malicious file with the same name in the folder the system checks first
Modify the local user group policy to add an account with elevated rights
Answer Description
Placing a malicious file in the location that the operating system interprets first causes the service to run that file with elevated permissions. The other options do not rely on the missing quotes in the path to gain higher access and require changes that do not utilize the path's vulnerability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the significance of a service path not enclosed in quotes in Windows?
How does the order of system path parsing allow privilege escalation?
How can you mitigate unquoted service path vulnerabilities in Windows?
While auditing a web service, you discover that a form field accepts special characters and sends them directly to a script for processing. Which measure best prevents malicious commands from being executed?
Set minimal privileges for the application account executing the script
Use parameterized statements and disciplined data handling methods
Review logs regularly and produce frequent threat reports
Check all input fields with client-side filters
Answer Description
Using parameterized calls and strict data handling keeps program instructions separate from the data that users supply. This reduces the chance of untrusted input triggering harmful commands. Generic client-side checks can be bypassed with manipulative techniques. Limiting access rights may slow an attacker but does not stop command-based exploits. Simple threat summaries do not fix major flaws, as unvalidated data can still lead to unauthorized commands.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are parameterized statements, and why are they important?
How do client-side filters compare to server-side validation for input sanitization?
Why doesn't limiting application privileges fully prevent command-based attacks?
During a security review, you used a specialized scanning utility to inspect a repository. The tool identified random strings labeled as potential credentials. Which action best verifies the seriousness of these discoveries?
Notify the developers to remove the flagged data from version history and move forward
Attempt to use the flagged data to see if it provides unauthorized access in a controlled location
Ignore these findings if subsequent scans do not list the same entries
Protect the suspicious data with encryption to minimize impact while investigating further
Answer Description
Testing whether the flagged data can grant access or reveal sensitive resources shows its authenticity and risk level. Removing the data without any validation might overlook active tokens that attackers can exploit. Rejecting findings if the program stops showing them could skip crucial verification, and simply encrypting strings does not confirm whether they reveal anything vital. Confirming the validity of each string is key to understanding potential exposure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a repository, and why might it contain sensitive data?
How does attempting to use flagged strings verify their seriousness?
What are the potential risks of removing flagged data without validation?
Which statement best describes the primary function of Aircrack-ng in a wireless testing environment?
It analyzes packet captures from protected networks to discover passphrases
It locates vulnerabilities in embedded IoT components through firmware scanning
It hides malicious software from antivirus detection on endpoints
It performs domain lookups and retrieves DNS records
Answer Description
This tool focuses on monitoring traffic and breaking Wi-Fi encryption by analyzing captured handshakes. This approach allows testers to assess configuration weaknesses in WEP and WPA networks. The other options describe unrelated activities, which do not fit the core purpose of this utility.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Aircrack-ng analyze captured handshakes to break Wi-Fi encryption?
What encryption protocols can Aircrack-ng test for vulnerabilities?
What other tools are included in the Aircrack-ng suite and how do they contribute to wireless testing?
A penetration tester has identified several vulnerabilities in a client's web application. To help the client prioritize remediation efforts, the tester needs to provide a quantitative risk rating for each one. Which of the following threat modeling frameworks is specifically designed to calculate a risk score by assigning numeric values to factors like potential damage, reproducibility, and exploitability?
A methodology that focuses on organizational assets, potential weaknesses, and risk tolerance
A process that places threats into categories like spoofing or repudiation
A reference that catalogs known attacker tactics and techniques
A system that calculates an overall risk score by assigning numeric values for multiple dimensions of possible damage
Answer Description
The correct option describes the DREAD (Damage, Reproducibility, Exploitability, Affected users, Discoverability) model, which uses a quantitative approach to rank threats by assigning numerical scores to various risk factors, allowing for clear prioritization of remediation efforts. The other options describe different frameworks: MITRE ATT&CK is a knowledge base of attacker behaviors, STRIDE is a model for categorizing threat types, and OCTAVE is a broader, asset-focused risk management process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What system is used to calculate an overall risk score using numeric values for multiple dimensions of possible damage?
What is the CVSS and how does it assign ratings?
Why is a numeric scoring system important in risk assessment?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.