CompTIA PenTest+ Practice Test (PT0-003)
Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA PenTest+ PT0-003 (V3) Information
CompTIA PenTest+ (PT0-003) is a professional cybersecurity certification designed for practitioners focusing on penetration testing and vulnerability assessment. It is an intermediate-level exam in CompTIA’s cybersecurity pathway, typically pursued after foundational certifications like Security+, and serves as the offensive or “red team” counterpart to the defensive CySA+ certification. The latest version (exam code PT0-003) updates the content to include modern technologies and threats, such as cloud and mobile environments, to ensure it remains relevant in today’s landscape. Below, we provide an overview of the exam structure, the key benefits of earning PenTest+ certification, and practical tips for studying and preparation.
Exam Structure and Format
The PenTest+ PT0-003 exam tests a broad range of penetration testing knowledge and skills. The exam consists of up to 90 questions in a 165-minute session. Questions are a mix of multiple-choice and performance-based items, meaning candidates must not only answer conceptual questions but also perform simulated penetration testing tasks. The exam is scored on a scale of 100–900, with a passing score of 750. CompTIA recommends that candidates have about 3–4 years of hands-on experience in information security or a related field before attempting this exam.
Exam Domains: The PenTest+ PT0-003 objectives are divided into five domains, each representing a key subject area and a percentage of the exam coverage:
- Engagement Management – 13%
- Reconnaissance and Enumeration – 21%
- Vulnerability Discovery and Analysis – 17%
- Attacks and Exploits – 35%
- Post-Exploitation and Lateral Movement – 14%
This structure ensures that the exam covers the entire penetration testing process end-to-end, from initial planning through exploitation and reporting. Because the exam includes performance-based questions, candidates should be prepared to perform tasks such as using tools or analyzing attack outputs in a simulated environment.
Benefits of Obtaining the PenTest+ Certification
Earning the CompTIA PenTest+ certification can significantly boost a cybersecurity professional’s career progression, especially for those specializing in offensive security roles. PenTest+ is globally recognized and even approved by the U.S. Department of Defense as a baseline certification for several cybersecurity job categories, underscoring its credibility in the industry.
One of the standout benefits of PenTest+ is its emphasis on practical skills. Unlike some certifications that are purely theoretical, PenTest+ includes hands-on, performance-based evaluation. This means certified individuals have proven they can perform real-world penetration testing tasks – planning engagements, exploiting vulnerabilities, and then analyzing and reporting the results – not just answer questions about them.
Professionally, PenTest+ opens doors to roles such as penetration tester, vulnerability assessment analyst, security analyst, and more. These roles are in high demand as organizations seek to bolster their defenses with skilled ethical hackers. Achieving PenTest+ demonstrates to employers that you possess a well-rounded skill set: you can identify weaknesses, exploit them to gauge impact, and recommend mitigations. This can make you a strong candidate for promotions or new job opportunities in the cybersecurity field.
Study and Preparation Tips
Preparing for the PenTest+ PT0-003 requires a combination of knowledge review and hands-on practice. Here are some vendor-neutral tips to help you get ready for the exam:
Review the Official Objectives: Start by downloading the CompTIA PenTest+ PT0-003 exam objectives and use them as a checklist. Make sure you understand each topic listed in the five domains. This ensures you cover all required knowledge areas, from engagement planning to post-exploitation processes.
Build Hands-On Skills: Given the exam’s practical components, set up a lab environment (using virtual machines or cloud instances) to practice penetration testing techniques. Work with common tools and frameworks like Nmap, Metasploit, Wireshark, and Burp Suite to perform scanning, exploitation, password cracking, and other tasks.
Understand Concepts in Context: Don’t just memorize definitions – learn how to apply concepts in real scenarios. The exam often presents scenario-based questions that require critical thinking to identify the best solution or root cause rather than straightforward recall.
Practice Time Management: You’ll have 165 minutes for a maximum of 90 questions, some of which may be complex tasks. Practice solving questions under timed conditions. A common strategy is to quickly answer all the multiple-choice questions first, then allocate remaining time to the performance-based tasks.
Take Practice Exams: Utilize reputable practice exams to test your knowledge and readiness. Practice tests help identify your weak areas and familiarize you with the exam format.
Study Reporting and Best Practices: Remember that penetration testing isn’t just about hacking into systems – it’s also about documenting findings and recommending fixes. Be prepared for questions on writing reports, communicating results to stakeholders, and adhering to legal/ethical standards.
By following these preparation strategies and thoroughly covering the exam domains, you’ll build both the knowledge and the practical know-how needed to succeed on the PenTest+ PT0-003 exam. Achieving this certification not only validates your skills in penetration testing and vulnerability management but also positions you for advancement in the booming field of cybersecurity.
Free CompTIA PenTest+ PT0-003 (V3) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:Engagement ManagementReconnaissance and EnumerationVulnerability Discovery and AnalysisAttacks and ExploitsPost-exploitation and Lateral Movement
An analyst notices that recent checks from a scanning tool return incomplete data for many targets. Which action best improves the depth of the collected results?
Configure policies to include authentication for the target hosts
Disable logging to reduce overhead for the next pass
Exclude recently provisioned resources during busy hours
Set the port scan range to the most common ports used in production
Answer Description
Providing valid credentials allows a scanning engine to inspect more detailed system data, such as patch levels and configuration files. This approach uncovers vulnerabilities that are inaccessible to non-authenticated scans. Changing port ranges or disabling logs may affect performance but do not increase visibility. Excluding additional hosts limits the overall test and may hide potential threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does authentication improve scanning results?
What are the risks of running scans without authentication?
What is the difference between authenticated and unauthenticated scans?
A team encountered repeated mistakes while assigning privileges during onboarding. Several users received more permissions than intended. Which action addresses these recurring and unstructured tasks?
Rotate staff coverage to ensure shared responsibility
Establish a structured runbook that defines each task, approval path, and validation step
Conduct focused group instruction about best practices
Provide targeted security guidance to all employees
Answer Description
Using a structured sequence for tasks and approvals helps identify and resolve common root causes by clarifying responsibilities. Less formal training or guidance can improve overall awareness but does not standardize actions. Distribution of responsibilities may be beneficial but does not directly address the need for a defined process that reduces errors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a runbook and how does it help reduce errors?
Why is formalized training not as effective as a structured runbook in this scenario?
How do approval paths in a runbook add value to task execution?
During a test, a consultant wants to degrade a target’s wireless environment by saturating it with repeating transmissions designed to hamper normal connections. Which method accomplishes this goal most effectively?
Force ongoing reauthentication requests for all connected devices
Boost transmissions on the same channel so legitimate devices cannot exchange data as intended
Inspect system vulnerabilities to reveal potential misconfigurations
Clone the network’s identifier and draw users to a similar access portal
Answer Description
By overwhelming the frequency in use with repeated signals, legitimate devices struggle to maintain stable connections. Other methods rely on techniques such as tricking users into connecting elsewhere or scanning for flaws, neither of which floods the target environment in a way that degrades performance through sheer interference.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to boost transmissions on the same channel in a wireless network?
Why do repeated signals cause issues for wireless connections?
How is this method different from forcing reauthentication requests in a wireless network?
Which approach involves quietly watching operational routines and gleaning details from accessible settings prior to a social engineering engagement?
Placing repeated calls to employees demanding internal data
Examining daily routines in publicly visible areas to gain user behavior insights
Running brute force tools to break password protections
Sending deceptive messages with hidden links for credential harvesting
Answer Description
The correct choice focuses on gathering information by observing day-to-day patterns. This approach differs from sending deceptive emails or placing phone calls, which involve direct contact. It also differs from trying to forcibly break or guess passwords, as those methods do not rely on discreet observation of routines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the term for quietly observing routines to gather information during a social engineering engagement?
How does passive reconnaissance differ from active reconnaissance?
Why is passive reconnaissance important in social engineering attacks?
You have a script that loops through a list of subdomains to check which ones resolve. The script runs a command on each item and prints lines containing “has address” when an address is found. You want to modify the script so that whenever a line contains “has address,” the resolved address is written to a file named addresses.txt. Which change meets these goals?
Use a command that searches for 'host info' instead of 'has address' and prints to standard output
Add an if condition that checks for 'has address', then use echo to append the match to addresses.txt
Pipe the output to tail, then append the last line to addresses.txt
Modify the file name in the script to addresses.txt and keep the existing command logic
Answer Description
The answer that uses an if statement to check for the text 'has address' and then writes the result to addresses.txt is correct. It ensures that the output is filtered in a conditional block, extracting only lines with an address and storing them for further review. Options that merely print output to the screen or rely on the presence of a different keyword do not fulfill the stated requirement of writing the data to addresses.txt. A statement that checks for a different text pattern will not capture the correct lines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of using the 'if' condition in the script?
Why is appending the output with 'echo' necessary?
What does 'has address' signify in the script output?
A consultant phones the help desk and claims to be a director who lost credentials. The consultant requests urgent password assistance for an important call. Which action is being used?
Observing a user’s screen while passwords are typed
Scanning discarded items for confidential data
Posing as a recognized contact seeking login assistance
Passing beyond a building entrance by following staff
Answer Description
The correct solution involves posing as a high-level individual to manipulate the help desk into revealing or resetting account details. This technique relies on trust in recognized roles to gain unauthorized access. The other choices describe different social engineering methods, such as attempting to enter restricted areas by walking behind someone, collecting discarded files for sensitive data, or monitoring users while they type. None of those involve adopting a false position of authority over the phone.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is social engineering in cybersecurity?
What is pretexting and how is it used in attacks?
How can help desks prevent pretexting attacks?
During a security review, you initiate a lookup on a target domain. Which detail is commonly obtained from this kind of query to expand insight into the organization's infrastructure?
It displays hashed user credentials
It shows an organization's firewall rules
It reveals domain registration data and ownership details
It uncovers the encryption key for the domain
Answer Description
A public domain record frequently displays details about the domain's registration and ownership. This helps researchers pinpoint key contacts and gain additional understanding of the target's network assets. Records of hashed user credentials, firewall rules, and the domain's encryption key are not typically found through this method.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are public domain records?
What is a WHOIS query, and how is it performed?
How can domain registration details help in a security assessment?
A consultant successfully gains elevated control of a workstation and wants to keep the remote connection when the system comes back online. Which technique accomplishes that goal?
Place injected code in memory for an active session
Set up a job that runs at system boot to launch a network listener
Modify user environment variables to load remote tools
Remove blocking rules from the local security filters
Answer Description
Scheduling a script that triggers at startup helps the consultant regain access whenever the system restarts. Removing firewall filters does not ensure sessions survive reboots. Changing user environment variables does not guarantee automatic connections. Injecting code into memory is temporary for that session and does not persist through shutdowns.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a network listener in the context of maintaining remote access?
How does setting up a startup job ensure persistence in a compromised system?
Why is injecting code into memory not sufficient for persistence?
While reviewing a cloud-based environment, you detect a user resource that appears open to internet traffic. Which option best confirms that unauthorized users can interact with the resource?
Send scanning requests from a remote system to check if the resource responds to unvalidated attempts
Attach a debugging library to the resource and inspect internal logs
Review environment variables for open network ports
Ask the cloud administrator to analyze internal routes
Answer Description
Sending scanning requests from an external vantage point is an effective way to confirm whether the resource is accessible outside the protected environment. This approach demonstrates actual responsiveness, which helps validate the exposure. Attaching a debugging library provides limited local insight and does not offer an external perspective. Environment variables may reveal open ports but do not prove interaction from outside the boundary. Asking the administrator to review internal routing does not establish that external connectivity is functional without testing it externally.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of sending scanning requests to a resource?
Why don’t internal logs or environment variables confirm external resource exposure?
How does analyzing internal routing differ from external scanning?
During a final briefing with an organization's leadership, the consultant wants to confirm the project outcome and provide next steps so that there is no confusion over any unresolved issues. Which approach meets these goals most effectively?
Organize a session with senior representatives to verify all objectives have been met, address final concerns, and document acceptance in writing
Wrap up testing after generating an initial draft and consider no further review unless the organization requests additional scans
Rely on an email from a mid-level manager saying the outcome is sufficient and distribute the result internally
Publish the report online and wait for any department to comment if additional checks are needed
Answer Description
Inviting key individuals to a concluding discussion and verifying the project is complete allows each finding to be reviewed and accepted before the official sign-off. This clarifies that the scope has been satisfied and gives the organization a final opportunity to address questions. Approaches that postpone further steps, skip in-person reviews, or rely on unverified statements can leave confusion about unresolved items or acceptance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to have a session with senior representatives for project wrap-up?
What are some potential issues with relying on a mid-level manager's email for project completion?
Why is it problematic to wrap up testing with just an initial draft report?
A security team is analyzing a flaw in a web system across different use cases. Which situation would typically be scored as the highest risk under widely recognized severity guidelines?
It is exploited by local administrators using debugging tools
It depends on physical access to restricted hardware used by administrative staff
It requires user confirmation before the flaw can be used
It can be triggered through a publicly reachable interface that requires low privileges
Answer Description
Attacks that can be executed from a publicly reachable point with low requirements usually receive higher marks due to broader impact and ease of exploitation. Conditions needing special access or advanced tools frequently reduce a vulnerability’s score because attackers face bigger hurdles. Flaws that rely on extra user action can also lower the severity by requiring one more step to complete.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are 'widely recognized severity guidelines' for evaluating vulnerabilities?
Why does the attack vector impact the severity score of a vulnerability?
What is meant by 'low privileges' when evaluating exploitability?
Which of the following approaches is the BEST way to locate open TCP ports on a remote environment while reducing detection by security systems?
Confirm port availability by establishing all connections
Send data to uncover responses
Log in to discovered services for deeper inspection
Use half-open connections without completing the handshake
Answer Description
Half-open scanning methods like SYN scans detect open TCP ports by sending a SYN packet and observing the response without completing the handshake. This reduces the likelihood of detection by logging systems compared to full TCP handshakes or active service probing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a SYN scan?
Why is a SYN scan less detectable than a full TCP connection scan?
How do security systems detect port scanning activities?
Which method best clarifies the allowed and disallowed segments for an assessment?
Discussing relevant industry regulations before tests begin
Including permitted network ranges and prohibited targets in a formal contract
Conducting a peer review to confirm the significance of each finding
Requiring higher-level executives to sign an agreement to protect classified information
Answer Description
A formal contract that identifies permitted network ranges and prohibited targets creates unambiguous guidelines. It documents what is fair game for the engagement and what is off-limits. Approaches focusing on confidentiality or analyzing regulations may be relevant, but they do not directly detail which systems and addresses are in or out of scope. Similarly, a peer review confirms quality but does not specify the exact boundaries of testing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of a formal contract in a penetration test?
What is meant by 'permitted network ranges' and 'prohibited targets'?
Why don’t confidentiality agreements or peer reviews define the test scope?
Your team suspects that a company wireless network experiences overlap with other nearby networks. After collecting data with a wireless scanning utility, you see multiple networks broadcasting on the same frequencies. Which step helps reduce collisions and enhance reliability?
Require a sign-in prompt for all wireless access
Conceal the network name from public broadcast
Choose frequencies identified as less crowded by the scanning utility
Lower the beacon interval to reduce management traffic
Answer Description
Selecting a frequency with less contention is the most effective way to minimize collisions. Lowering the beacon interval does not eliminate overlapping signals. Hiding the broadcast name only reduces visibility. Adding a sign-in method restricts access but does not solve interference caused by shared channels.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is frequency contention in wireless networks?
How do wireless scanning utilities identify less crowded frequencies?
Why doesn't lowering the beacon interval help reduce signal overlap?
During a security evaluation, you notice a service listening on TCP port 22 and suspect the login mechanism may allow repeated attempts. Which command line tool is used for systematically testing multiple username and password combinations?
Netcat
Wireshark
Nmap
Hydra
Answer Description
Hydra follows a structured approach to trying multiple credential sets across remote services, making it valuable for locating weak login passages. Netcat reads and writes network data without methodically verifying different credentials. Nmap is focused on inspection and detection, while Wireshark captures and reviews network traffic without attempting login combinations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Hydra used for in penetration testing?
How does Hydra compare to Netcat in functionality?
Why is Nmap not suitable for testing login mechanisms?
Which approach is a good method for creating specialized data sets with adjusted fields to evaluate how a firewall applies its filters?
Applying a proxy that adjusts handshake parameters
Running a repetitive script that enters known passwords on the target
Capturing traffic with a network analysis utility for inspection
Using a program that modifies headers, flags, and checksums during creation
Answer Description
Using a program that modifies headers, flags, and checksums during creation allows for thorough testing of a firewall's filtering rules. An intercepting proxy focuses on adjusting ongoing sessions and is less flexible for creating custom data sets. Network analysis utilities capture traffic but do not generate or craft new data. Repetitive scripts for credential attempts do not modify packet fields.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is modifying headers, flags, and checksums useful for testing firewalls?
What is the difference between capturing traffic and generating custom packets?
What tools can be used to modify packet headers, flags, and checksums?
A security consultant notices an attacker sending many authorization requests to a user’s mobile device. The user concedes after receiving so many notifications and taps the approval. Which tactic describes overwhelming a target with repeated prompts to gain access?
Pilfering high-level tickets from a domain controller for unrestricted account impersonation
Embedding a macro within a file so that the code executes without repeated user interaction
Generating numerous approval messages, anticipating a user will agree to end the constant alerts
Leveraging reused hashes from a cached system to bypass additional login prompts
Answer Description
Repeated prompts rely on user annoyance. Eventually, the user taps accept, relinquishing security controls. This is different from planting malicious macros or capturing credentials from a server, which do not rely on flooding the user’s device with requests. Stealing a hash also differs because it uses existing credentials, not user exhaustion.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the tactic of overwhelming a target with repeated prompts called?
How does an MFA fatigue attack differ from social engineering attacks?
What are some ways to mitigate MFA fatigue attacks?
A tester gains access to an internal subnet and finds a service on port 23. The tester initiates a session and is greeted with a request for credentials through an unencrypted interface. Which method describes the approach that led to this prompt?
An encrypted administrative channel over port 443
A secure console that relies on port 22 for connections
An unencrypted interactive console running on port 23
A remote management tool configured with key-based authentication
Answer Description
Telnet is an unencrypted interactive console that runs on port 23. This explains why the tester received a visible command prompt and a cleartext request for credentials. The other methods rely on different protocols and ports. Encrypted tools use port 22 or 443, and they incorporate stronger security methods that were not used in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Telnet, and why is it considered insecure?
What is the difference between Telnet and SSH?
How can a Penetration Tester exploit an unencrypted Telnet connection?
During an assessment, you discover login forms that do not lock user accounts and do not register repeated passcode failures. Which tactic would best determine whether any accounts can be accessed by making a large number of passcode guesses on each username?
Capturing traffic over the network with a packet analyzer for session tokens
Embedding malicious commands into the username field to bypass credentials
Repeated submissions of potential passcodes to each login field to detect valid ones
Redirecting authenticated tokens through an interception proxy
Answer Description
A systematic sequence of passcode attempts, often drawn from lists of common or guessed sequences, highlights weaknesses in login processes that lack account lockouts. This tactic identifies if any valid passcode exists among many attempts. Other approaches, like injecting malicious instructions into form fields or intercepting cookies in transit, might reveal different weaknesses but do not rely on systematically testing numerous passcode guesses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a brute-force attack and why is it effective in this scenario?
What is an 'account lockout' feature and how does it defend against attacks?
What is the difference between brute-forcing and other attack methods like injection or session hijacking?
Which approach involves rewriting existing data to remove signs of questionable acts?
Protecting data with cryptographic methods
Sending system events to a remote audit repository
Modifying existing records to erase clues of malicious actions
Examining records with specialized tools to identify anomalies
Answer Description
Altering the contents of records conceals suspicious events from investigators. Cryptography and offsite storage protection do not delete or modify evidence, and scanning logs for anomalies merely reviews them instead of changing content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some real-world examples of modifying existing records to erase evidence?
How do security teams detect record modification by attackers?
Why doesn’t cryptography prevent record modification in this context?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.