00:15:00

CompTIA PenTest+ Practice Test (PT0-003)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-003
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-003 Information

CompTIA PenTest+ (PT0-003) is a professional cybersecurity certification designed for practitioners focusing on penetration testing and vulnerability assessment. It is an intermediate-level exam in CompTIA’s cybersecurity pathway, typically pursued after foundational certifications like Security+, and serves as the offensive or “red team” counterpart to the defensive CySA+ certification. The latest version (exam code PT0-003) updates the content to include modern technologies and threats, such as cloud and mobile environments, to ensure it remains relevant in today’s landscape. Below, we provide an overview of the exam structure, the key benefits of earning PenTest+ certification, and practical tips for studying and preparation.

Exam Structure and Format

The PenTest+ PT0-003 exam tests a broad range of penetration testing knowledge and skills. The exam consists of up to 90 questions in a 165-minute session. Questions are a mix of multiple-choice and performance-based items, meaning candidates must not only answer conceptual questions but also perform simulated penetration testing tasks. The exam is scored on a scale of 100–900, with a passing score of 750. CompTIA recommends that candidates have about 3–4 years of hands-on experience in information security or a related field before attempting this exam.

Exam Domains: The PenTest+ PT0-003 objectives are divided into five domains, each representing a key subject area and a percentage of the exam coverage:

  • Engagement Management – 13%
  • Reconnaissance and Enumeration – 21%
  • Vulnerability Discovery and Analysis – 17%
  • Attacks and Exploits – 35%
  • Post-Exploitation and Lateral Movement – 14%

This structure ensures that the exam covers the entire penetration testing process end-to-end, from initial planning through exploitation and reporting. Because the exam includes performance-based questions, candidates should be prepared to perform tasks such as using tools or analyzing attack outputs in a simulated environment.

Benefits of Obtaining the PenTest+ Certification

Earning the CompTIA PenTest+ certification can significantly boost a cybersecurity professional’s career progression, especially for those specializing in offensive security roles. PenTest+ is globally recognized and even approved by the U.S. Department of Defense as a baseline certification for several cybersecurity job categories, underscoring its credibility in the industry.

One of the standout benefits of PenTest+ is its emphasis on practical skills. Unlike some certifications that are purely theoretical, PenTest+ includes hands-on, performance-based evaluation. This means certified individuals have proven they can perform real-world penetration testing tasks – planning engagements, exploiting vulnerabilities, and then analyzing and reporting the results – not just answer questions about them.

Professionally, PenTest+ opens doors to roles such as penetration tester, vulnerability assessment analyst, security analyst, and more. These roles are in high demand as organizations seek to bolster their defenses with skilled ethical hackers. Achieving PenTest+ demonstrates to employers that you possess a well-rounded skill set: you can identify weaknesses, exploit them to gauge impact, and recommend mitigations. This can make you a strong candidate for promotions or new job opportunities in the cybersecurity field.

Study and Preparation Tips

Preparing for the PenTest+ PT0-003 requires a combination of knowledge review and hands-on practice. Here are some vendor-neutral tips to help you get ready for the exam:

  • Review the Official Objectives: Start by downloading the CompTIA PenTest+ PT0-003 exam objectives and use them as a checklist. Make sure you understand each topic listed in the five domains. This ensures you cover all required knowledge areas, from engagement planning to post-exploitation processes.

  • Build Hands-On Skills: Given the exam’s practical components, set up a lab environment (using virtual machines or cloud instances) to practice penetration testing techniques. Work with common tools and frameworks like Nmap, Metasploit, Wireshark, and Burp Suite to perform scanning, exploitation, password cracking, and other tasks.

  • Understand Concepts in Context: Don’t just memorize definitions – learn how to apply concepts in real scenarios. The exam often presents scenario-based questions that require critical thinking to identify the best solution or root cause rather than straightforward recall.

  • Practice Time Management: You’ll have 165 minutes for a maximum of 90 questions, some of which may be complex tasks. Practice solving questions under timed conditions. A common strategy is to quickly answer all the multiple-choice questions first, then allocate remaining time to the performance-based tasks.

  • Take Practice Exams: Utilize reputable practice exams to test your knowledge and readiness. Practice tests help identify your weak areas and familiarize you with the exam format.

  • Study Reporting and Best Practices: Remember that penetration testing isn’t just about hacking into systems – it’s also about documenting findings and recommending fixes. Be prepared for questions on writing reports, communicating results to stakeholders, and adhering to legal/ethical standards.

By following these preparation strategies and thoroughly covering the exam domains, you’ll build both the knowledge and the practical know-how needed to succeed on the PenTest+ PT0-003 exam. Achieving this certification not only validates your skills in penetration testing and vulnerability management but also positions you for advancement in the booming field of cybersecurity.

Free CompTIA PenTest+ PT0-003 Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    Engagement Management
    Reconnaissance and Enumeration
    Vulnerability Discovery and Analysis
    Attacks and Exploits
    Post-exploitation and Lateral Movement
Question 1 of 15

A security consultant is researching domain records, email addresses, and leaked credentials for a client. The consultant chooses a web-based aggregator that organizes various categories of open-source data repositories on one page. Which action best describes a benefit gained from using that site?

  • They bypass domain ownership restrictions by exploiting hidden DNS entries.

  • They collect real-time logs of security events from external servers.

  • They retrieve confidential user information from paid private repositories.

  • They reduce search time by referencing multiple open intelligence sources from one place.

Question 2 of 15

During a scheduled assessment, you identify extra actions beyond the original agreement in a location with uncertain guidelines, and the sponsor verbally supports proceeding. Which approach helps limit liability concerns?

  • Include an acknowledgment of the additional tasks during project review instead of revising the scope

  • Use the sponsor’s verbal approval and make a note of it for your own reference

  • Continue following the initial authorization without making further adjustments

  • Document the approval for the new tasks and reflect them in the updated project scope

Question 3 of 15

Which specialized software can automate credential testing across different services during security evaluations?

  • Netcat

  • Hydra

  • John the Ripper

  • sqlmap

Question 4 of 15

An organization is retiring several servers that stored sensitive data. Which approach best prevents retrieval of the stored information when those servers are taken out of operation?

  • Remove the file system and partition entries with an operating system command

  • Detach the drives and record the serial numbers prior to off-site storage

  • Peel off labels and barcodes from the drive enclosures

  • Perform repeated writes of random patterns on the drives using specialized utilities

Question 5 of 15

A consultant at a technology firm is tasked to gather addresses for staff members at a partner company’s subdomains. The goal is to populate a list for a targeted proposal campaign. Which method allows the consultant to collect a wide range of domain-specific addresses with minimal effort?

  • Using an aggregator that compiles domain-based addresses from multiple public sources

  • Inspecting response headers from subdomain homepages

  • Running netstat commands to spot mail services on local machines

  • Searching repositories for a plaintext staff directory file

Question 6 of 15

An organization suspects new container images might include questionable instructions. Which scanning step is more likely to reveal these concerns before the container is started?

  • Monitor logs during peak usage for anomalies

  • Evaluate open network connections after the new image is active

  • Analyze each block of instructions used in the image creation file

  • Use repeated scans on the staging environment after initial deployment

Question 7 of 15

An individual attempts to replicate an employee’s staff pass using specialized equipment. Which measure provides the strongest deterrent against duplication?

  • Add a laminate overlay that displays a staff photo on the pass

  • Restrict entry for those without a designated uniform color

  • Use credentials that change key data whenever they are presented

  • Integrate a database lookup to confirm pass data upon each entry

Question 8 of 15

A malicious actor altered a popular online forum that employees often browse. After embedding a hidden script that collects logins, the actor waits for them to connect. Which strategy best identifies this scenario, commonly referred to as a 'Watering hole'?

  • Launching a fraudulent message disguised as an internal security advisory

  • Disrupting protected connections through an on-path interception

  • Modifying a reliable web resource accessed by the workforce to gather credentials

  • Embedding harmful code in a local maintenance tool that staff regularly install

Question 9 of 15

On a compromised client device, several digital images appear unusually large for their apparent content. You suspect data has been embedded in these files. What would be an effective way to access the hidden data?

  • Collecting file checksums to look for inconsistencies

  • Examining the file’s structure with a specialized utility for concealed data

  • Investigating the audit logs for numerous permission changes

  • Reviewing DNS queries for suspicious domain lookups

Question 10 of 15

Which best describes the process called wardriving?

  • Sending crafted packets that falsify authentication details on access points

  • Scanning for wireless broadcasts while moving across different areas and tracking relevant data

  • Flooding network traffic with messages that force disconnections

  • Placing a deceptive gateway to appear like legitimate hotspots and steal access credentials

Question 11 of 15

Security staff discovered domain user password hashes on a workstation. The consultant wants to check whether these stolen hashes can allow remote login to other hosts. Which component in this library is most appropriate for testing infiltration with the discovered data?

  • A module that gathers DNS zone entries for record analysis

  • A network utility for detecting open ports on target systems

  • A script that tries remote session access using hashed credentials

  • A function for passively recording spool data from shared print queues

Question 12 of 15

Which activity requires colleagues to examine the outcomes to confirm accuracy before finalizing them?

  • A formal sign-off from legal counsel included in the final contract

  • Allowing more time for the same individual to recheck the work

  • Team-based validation performed by multiple specialists

  • A second scan by an internal group using the same parameters

Question 13 of 15

A consultant investigating a compromised workstation notices an attacker is using a valid session object from a user’s active login to engage with multiple systems throughout the network. Which approach has the attacker used to maintain this unauthorized access?

  • Abusing a misconfigured Kerberos process for service ticket requests

  • Launching a credential hash into a separate login attempt

  • Invoking an inter-process call to act as the compromised account

  • Reusing a legitimate session object for user impersonation

Question 14 of 15

A team is analyzing a site that uses a perimeter module to hide its actual system address. Which technique uncovers the real network location the perimeter module is masking?

  • Inspecting older certificate records for references to the true asset

  • Applying a random security assessment tool on the external domain

  • Reviewing a config file for instructions on asset addresses

  • Scanning the site’s HTML files for comments containing host addresses

Question 15 of 15

Which scanning method is least likely to be recognized by intrusion detection tools?

  • SYN scanning

  • ACK-based approach

  • UDP-based approach

  • TCP Connect scanning