CompTIA PenTest+ Practice Test (PT0-003)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-003 Information
CompTIA PenTest+ (PT0-003) is a professional cybersecurity certification designed for practitioners focusing on penetration testing and vulnerability assessment. It is an intermediate-level exam in CompTIA’s cybersecurity pathway, typically pursued after foundational certifications like Security+, and serves as the offensive or “red team” counterpart to the defensive CySA+ certification. The latest version (exam code PT0-003) updates the content to include modern technologies and threats, such as cloud and mobile environments, to ensure it remains relevant in today’s landscape. Below, we provide an overview of the exam structure, the key benefits of earning PenTest+ certification, and practical tips for studying and preparation.
Exam Structure and Format
The PenTest+ PT0-003 exam tests a broad range of penetration testing knowledge and skills. The exam consists of up to 90 questions in a 165-minute session. Questions are a mix of multiple-choice and performance-based items, meaning candidates must not only answer conceptual questions but also perform simulated penetration testing tasks. The exam is scored on a scale of 100–900, with a passing score of 750. CompTIA recommends that candidates have about 3–4 years of hands-on experience in information security or a related field before attempting this exam.
Exam Domains: The PenTest+ PT0-003 objectives are divided into five domains, each representing a key subject area and a percentage of the exam coverage:
- Engagement Management – 13%
- Reconnaissance and Enumeration – 21%
- Vulnerability Discovery and Analysis – 17%
- Attacks and Exploits – 35%
- Post-Exploitation and Lateral Movement – 14%
This structure ensures that the exam covers the entire penetration testing process end-to-end, from initial planning through exploitation and reporting. Because the exam includes performance-based questions, candidates should be prepared to perform tasks such as using tools or analyzing attack outputs in a simulated environment.
Benefits of Obtaining the PenTest+ Certification
Earning the CompTIA PenTest+ certification can significantly boost a cybersecurity professional’s career progression, especially for those specializing in offensive security roles. PenTest+ is globally recognized and even approved by the U.S. Department of Defense as a baseline certification for several cybersecurity job categories, underscoring its credibility in the industry.
One of the standout benefits of PenTest+ is its emphasis on practical skills. Unlike some certifications that are purely theoretical, PenTest+ includes hands-on, performance-based evaluation. This means certified individuals have proven they can perform real-world penetration testing tasks – planning engagements, exploiting vulnerabilities, and then analyzing and reporting the results – not just answer questions about them.
Professionally, PenTest+ opens doors to roles such as penetration tester, vulnerability assessment analyst, security analyst, and more. These roles are in high demand as organizations seek to bolster their defenses with skilled ethical hackers. Achieving PenTest+ demonstrates to employers that you possess a well-rounded skill set: you can identify weaknesses, exploit them to gauge impact, and recommend mitigations. This can make you a strong candidate for promotions or new job opportunities in the cybersecurity field.
Study and Preparation Tips
Preparing for the PenTest+ PT0-003 requires a combination of knowledge review and hands-on practice. Here are some vendor-neutral tips to help you get ready for the exam:
Review the Official Objectives: Start by downloading the CompTIA PenTest+ PT0-003 exam objectives and use them as a checklist. Make sure you understand each topic listed in the five domains. This ensures you cover all required knowledge areas, from engagement planning to post-exploitation processes.
Build Hands-On Skills: Given the exam’s practical components, set up a lab environment (using virtual machines or cloud instances) to practice penetration testing techniques. Work with common tools and frameworks like Nmap, Metasploit, Wireshark, and Burp Suite to perform scanning, exploitation, password cracking, and other tasks.
Understand Concepts in Context: Don’t just memorize definitions – learn how to apply concepts in real scenarios. The exam often presents scenario-based questions that require critical thinking to identify the best solution or root cause rather than straightforward recall.
Practice Time Management: You’ll have 165 minutes for a maximum of 90 questions, some of which may be complex tasks. Practice solving questions under timed conditions. A common strategy is to quickly answer all the multiple-choice questions first, then allocate remaining time to the performance-based tasks.
Take Practice Exams: Utilize reputable practice exams to test your knowledge and readiness. Practice tests help identify your weak areas and familiarize you with the exam format.
Study Reporting and Best Practices: Remember that penetration testing isn’t just about hacking into systems – it’s also about documenting findings and recommending fixes. Be prepared for questions on writing reports, communicating results to stakeholders, and adhering to legal/ethical standards.
By following these preparation strategies and thoroughly covering the exam domains, you’ll build both the knowledge and the practical know-how needed to succeed on the PenTest+ PT0-003 exam. Achieving this certification not only validates your skills in penetration testing and vulnerability management but also positions you for advancement in the booming field of cybersecurity.
Scroll down to see your responses and detailed results
Free CompTIA PenTest+ PT0-003 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Engagement ManagementReconnaissance and EnumerationVulnerability Discovery and AnalysisAttacks and ExploitsPost-exploitation and Lateral Movement
A security consultant is researching domain records, email addresses, and leaked credentials for a client. The consultant chooses a web-based aggregator that organizes various categories of open-source data repositories on one page. Which action best describes a benefit gained from using that site?
They bypass domain ownership restrictions by exploiting hidden DNS entries.
They collect real-time logs of security events from external servers.
They retrieve confidential user information from paid private repositories.
They reduce search time by referencing multiple open intelligence sources from one place.
Answer Description
By using a unified set of public data references, the consultant locates specialized tools and resources in one place, cutting down on time spent searching multiple platforms. The other actions describe capabilities that either involve restricted data or real-time monitoring, which is not how that aggregator functions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is open-source intelligence (OSINT)?
How does an aggregator benefit OSINT investigations?
Why can't aggregators access private or restricted data?
During a scheduled assessment, you identify extra actions beyond the original agreement in a location with uncertain guidelines, and the sponsor verbally supports proceeding. Which approach helps limit liability concerns?
Include an acknowledgment of the additional tasks during project review instead of revising the scope
Use the sponsor’s verbal approval and make a note of it for your own reference
Continue following the initial authorization without making further adjustments
Document the approval for the new tasks and reflect them in the updated project scope
Answer Description
When new responsibilities arise, an updated scope ensures better protection against misunderstandings and disputes. Verbal approvals or waiting until a project review to acknowledge extra work may lead to unresolved liability issues in environments with unclear regulations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to document updated project scope during an assessment?
Can verbal approvals be considered valid during a project assessment?
What are the risks of waiting until a project review to acknowledge extra tasks?
Which specialized software can automate credential testing across different services during security evaluations?
Netcat
Hydra
John the Ripper
sqlmap
Answer Description
This option is correct because Hydra is designed to perform password attacks against a variety of protocols. This includes services like SSH and HTTP in both dictionary and brute-force approaches. John the Ripper is specialized in offline analysis of encrypted credentials. Netcat is a versatile utility for creating raw network connections without dedicated brute-force capabilities. sqlmap focuses on injection vulnerabilities targeting backend databases, not broad credential checks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes Hydra effective in performing automated credential testing?
How does Hydra differ from John the Ripper in password testing?
Can Hydra be used for penetration testing on all types of networks?
An organization is retiring several servers that stored sensitive data. Which approach best prevents retrieval of the stored information when those servers are taken out of operation?
Remove the file system and partition entries with an operating system command
Detach the drives and record the serial numbers prior to off-site storage
Peel off labels and barcodes from the drive enclosures
Perform repeated writes of random patterns on the drives using specialized utilities
Answer Description
Running multiple overwrite passes on storage media with specialized software hinders later attempts to recover previously written data. Detaching drives, removing partition information, or taking off external labels do not reliably remove data from the underlying media.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is overwriting data with random patterns better for data removal?
What tools are commonly used for securely overwriting drives?
How does overwriting compare to physical destruction for preventing data recovery?
A consultant at a technology firm is tasked to gather addresses for staff members at a partner company’s subdomains. The goal is to populate a list for a targeted proposal campaign. Which method allows the consultant to collect a wide range of domain-specific addresses with minimal effort?
Using an aggregator that compiles domain-based addresses from multiple public sources
Inspecting response headers from subdomain homepages
Running netstat commands to spot mail services on local machines
Searching repositories for a plaintext staff directory file
Answer Description
An aggregator that compiles publicly listed contacts retrieves various addresses from multiple sources linked to a specific domain. Capturing HTTP response headers reveals server information but does not provide email details. Running netstat focuses on local or active network connections rather than domain-based addresses. Repositories contain code and notes but are not a direct source of a comprehensive contact list unless exposed by oversight.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a public aggregator for domain-based addresses?
Why doesn’t inspecting HTTP response headers help in gathering domain-based addresses?
What makes repositories unreliable for finding comprehensive staff directories?
An organization suspects new container images might include questionable instructions. Which scanning step is more likely to reveal these concerns before the container is started?
Monitor logs during peak usage for anomalies
Evaluate open network connections after the new image is active
Analyze each block of instructions used in the image creation file
Use repeated scans on the staging environment after initial deployment
Answer Description
Examining the instructions in an image creation file first locates flaws that might go undetected in later runtime assessments. Observing open network connections or logs can expose runtime issues but might miss design weaknesses introduced earlier. Repeated scans on a staging environment can help catch some misconfigurations, yet they may not pinpoint the root cause in build files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an image creation file in containerization?
Why might runtime assessments miss flaws in the image creation file?
What tools can analyze an image creation file for vulnerabilities?
An individual attempts to replicate an employee’s staff pass using specialized equipment. Which measure provides the strongest deterrent against duplication?
Add a laminate overlay that displays a staff photo on the pass
Restrict entry for those without a designated uniform color
Use credentials that change key data whenever they are presented
Integrate a database lookup to confirm pass data upon each entry
Answer Description
Credentials that change key data introduce a new handshake each time they are used. This disrupts anyone who seeks to capture and duplicate a single, static signal. A laminate overlay is a visual deterrent that can be replicated with high-resolution printing. Granting entry based on uniform color ignores the pass’s authenticity. External database lookup alone does not stop the pass from being copied if the stored data is captured once.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are credentials that change key data?
How does a laminate overlay work as a deterrent?
Why is relying solely on uniform color or database lookup insecure?
A malicious actor altered a popular online forum that employees often browse. After embedding a hidden script that collects logins, the actor waits for them to connect. Which strategy best identifies this scenario, commonly referred to as a 'Watering hole'?
Launching a fraudulent message disguised as an internal security advisory
Disrupting protected connections through an on-path interception
Modifying a reliable web resource accessed by the workforce to gather credentials
Embedding harmful code in a local maintenance tool that staff regularly install
Answer Description
This method focuses on a legitimate website that users visit. It captures their credentials, reducing the need for direct infiltration of their internal endpoints. Infecting an internal application, sending email notices, or interfering with secure connections involve different tactics or rely on other user interaction methods.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a 'Watering Hole' attack?
How is a Watering Hole attack different from Phishing?
How can organizations prevent Watering Hole attacks?
On a compromised client device, several digital images appear unusually large for their apparent content. You suspect data has been embedded in these files. What would be an effective way to access the hidden data?
Collecting file checksums to look for inconsistencies
Examining the file’s structure with a specialized utility for concealed data
Investigating the audit logs for numerous permission changes
Reviewing DNS queries for suspicious domain lookups
Answer Description
Specialized tools analyze patterns within file structures to extract embedded messages. Inspecting network logs or DNS traffic alone will not reveal hidden data in the image itself. Comparing checksums might detect file alterations, but it will not uncover the concealed information. Analyzing the file structure with steganography-focused utilities remains the most direct way to retrieve the data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is steganography in digital files?
What types of tools are used to detect hidden data in files?
Why wouldn’t checksums or DNS logs reveal embedded data?
Which best describes the process called wardriving?
Sending crafted packets that falsify authentication details on access points
Scanning for wireless broadcasts while moving across different areas and tracking relevant data
Flooding network traffic with messages that force disconnections
Placing a deceptive gateway to appear like legitimate hotspots and steal access credentials
Answer Description
This method involves traveling with a device to detect wireless signals and gather information about them. The other choices describe different tactics, like impersonating hotspots or attacking connections directly, which do not require physically roaming to discover and map networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools are commonly used for wardriving?
How does wardriving differ from warwalking or warflying?
What risks or threats can be posed by wardriving?
Security staff discovered domain user password hashes on a workstation. The consultant wants to check whether these stolen hashes can allow remote login to other hosts. Which component in this library is most appropriate for testing infiltration with the discovered data?
A module that gathers DNS zone entries for record analysis
A network utility for detecting open ports on target systems
A script that tries remote session access using hashed credentials
A function for passively recording spool data from shared print queues
Answer Description
A script that uses hashed authentication for remote session access validates if the stolen information can actually enable unauthorized entry. Other choices, such as enumerating DNS, collecting spool traffic, or port scanning do not demonstrate whether a compromised user hash can open a command channel on another machine.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are password hashes and why are they used?
What is pass-the-hash (PtH) and how does it work in infiltration attempts?
Why is testing remote session access with hashed credentials important?
Which activity requires colleagues to examine the outcomes to confirm accuracy before finalizing them?
A formal sign-off from legal counsel included in the final contract
Allowing more time for the same individual to recheck the work
Team-based validation performed by multiple specialists
A second scan by an internal group using the same parameters
Answer Description
Having multiple professionals scrutinize the information helps identify any oversights or inconsistencies a single individual may miss. Other choices involve scanning tasks, time extensions, or additional sign-offs, which do not center on a thorough group evaluation process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a team-based validation process important?
How does team-based validation differ from a second scan or rechecking by the same person?
Can legal counsel involvement replace team-based validation?
A consultant investigating a compromised workstation notices an attacker is using a valid session object from a user’s active login to engage with multiple systems throughout the network. Which approach has the attacker used to maintain this unauthorized access?
Abusing a misconfigured Kerberos process for service ticket requests
Launching a credential hash into a separate login attempt
Invoking an inter-process call to act as the compromised account
Reusing a legitimate session object for user impersonation
Answer Description
This manipulation involves reusing a legitimate session object obtained from a compromised user. It does not need a hash (pass-the-hash) or ticket (pass-the-ticket). Remote procedure call tactics rely on direct service invocation, and misconfigurations with Kerberos typically revolve around service ticket exploitation. By reusing the stolen session data, the attacker bypasses standard credential checks and impersonates the user.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a session object in cybersecurity?
How can attackers steal or reuse a session object?
How do organizations protect against session object reuse attacks?
A team is analyzing a site that uses a perimeter module to hide its actual system address. Which technique uncovers the real network location the perimeter module is masking?
Inspecting older certificate records for references to the true asset
Applying a random security assessment tool on the external domain
Reviewing a config file for instructions on asset addresses
Scanning the site’s HTML files for comments containing host addresses
Answer Description
Archived certificate logs can hold earlier domain details that point to actual addresses. The site’s code might not contain a direct reference to the server IP. A third-party vulnerability scan does not typically expose hidden addresses. Reviewing a configuration file does not guarantee visibility into the true system IP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a perimeter module, and why does it hide system addresses?
What are certificate records, and how can they reveal hidden system addresses?
Why wouldn’t scanning HTML files, using random tools, or checking config files work in this case?
Which scanning method is least likely to be recognized by intrusion detection tools?
SYN scanning
ACK-based approach
UDP-based approach
TCP Connect scanning
Answer Description
SYN scanning sends an initial TCP packet but does not complete the handshake, which often results in fewer logged events. TCP Connect scanning completes the connection, leaving more evidence in system logs. ACK-based approaches send special flags that can trigger alerts. UDP-based methods are noticeable due to repeated connection attempts on ports.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does SYN scanning work compared to other scanning methods?
Why is SYN scanning less detectable than TCP Connect scanning?
What makes UDP-based scanning more noticeable to intrusion detection tools?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.