00:20:00

CompTIA PenTest+ Practice Test (PT0-003)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-003 (V3)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-003 (V3) Information

CompTIA PenTest+ (PT0-003) is a professional cybersecurity certification designed for practitioners focusing on penetration testing and vulnerability assessment. It is an intermediate-level exam in CompTIA’s cybersecurity pathway, typically pursued after foundational certifications like Security+, and serves as the offensive or “red team” counterpart to the defensive CySA+ certification. The latest version (exam code PT0-003) updates the content to include modern technologies and threats, such as cloud and mobile environments, to ensure it remains relevant in today’s landscape. Below, we provide an overview of the exam structure, the key benefits of earning PenTest+ certification, and practical tips for studying and preparation.

Exam Structure and Format

The PenTest+ PT0-003 exam tests a broad range of penetration testing knowledge and skills. The exam consists of up to 90 questions in a 165-minute session. Questions are a mix of multiple-choice and performance-based items, meaning candidates must not only answer conceptual questions but also perform simulated penetration testing tasks. The exam is scored on a scale of 100–900, with a passing score of 750. CompTIA recommends that candidates have about 3–4 years of hands-on experience in information security or a related field before attempting this exam.

Exam Domains: The PenTest+ PT0-003 objectives are divided into five domains, each representing a key subject area and a percentage of the exam coverage:

  • Engagement Management – 13%
  • Reconnaissance and Enumeration – 21%
  • Vulnerability Discovery and Analysis – 17%
  • Attacks and Exploits – 35%
  • Post-Exploitation and Lateral Movement – 14%

This structure ensures that the exam covers the entire penetration testing process end-to-end, from initial planning through exploitation and reporting. Because the exam includes performance-based questions, candidates should be prepared to perform tasks such as using tools or analyzing attack outputs in a simulated environment.

Benefits of Obtaining the PenTest+ Certification

Earning the CompTIA PenTest+ certification can significantly boost a cybersecurity professional’s career progression, especially for those specializing in offensive security roles. PenTest+ is globally recognized and even approved by the U.S. Department of Defense as a baseline certification for several cybersecurity job categories, underscoring its credibility in the industry.

One of the standout benefits of PenTest+ is its emphasis on practical skills. Unlike some certifications that are purely theoretical, PenTest+ includes hands-on, performance-based evaluation. This means certified individuals have proven they can perform real-world penetration testing tasks – planning engagements, exploiting vulnerabilities, and then analyzing and reporting the results – not just answer questions about them.

Professionally, PenTest+ opens doors to roles such as penetration tester, vulnerability assessment analyst, security analyst, and more. These roles are in high demand as organizations seek to bolster their defenses with skilled ethical hackers. Achieving PenTest+ demonstrates to employers that you possess a well-rounded skill set: you can identify weaknesses, exploit them to gauge impact, and recommend mitigations. This can make you a strong candidate for promotions or new job opportunities in the cybersecurity field.

Study and Preparation Tips

Preparing for the PenTest+ PT0-003 requires a combination of knowledge review and hands-on practice. Here are some vendor-neutral tips to help you get ready for the exam:

  • Review the Official Objectives: Start by downloading the CompTIA PenTest+ PT0-003 exam objectives and use them as a checklist. Make sure you understand each topic listed in the five domains. This ensures you cover all required knowledge areas, from engagement planning to post-exploitation processes.

  • Build Hands-On Skills: Given the exam’s practical components, set up a lab environment (using virtual machines or cloud instances) to practice penetration testing techniques. Work with common tools and frameworks like Nmap, Metasploit, Wireshark, and Burp Suite to perform scanning, exploitation, password cracking, and other tasks.

  • Understand Concepts in Context: Don’t just memorize definitions – learn how to apply concepts in real scenarios. The exam often presents scenario-based questions that require critical thinking to identify the best solution or root cause rather than straightforward recall.

  • Practice Time Management: You’ll have 165 minutes for a maximum of 90 questions, some of which may be complex tasks. Practice solving questions under timed conditions. A common strategy is to quickly answer all the multiple-choice questions first, then allocate remaining time to the performance-based tasks.

  • Take Practice Exams: Utilize reputable practice exams to test your knowledge and readiness. Practice tests help identify your weak areas and familiarize you with the exam format.

  • Study Reporting and Best Practices: Remember that penetration testing isn’t just about hacking into systems – it’s also about documenting findings and recommending fixes. Be prepared for questions on writing reports, communicating results to stakeholders, and adhering to legal/ethical standards.

By following these preparation strategies and thoroughly covering the exam domains, you’ll build both the knowledge and the practical know-how needed to succeed on the PenTest+ PT0-003 exam. Achieving this certification not only validates your skills in penetration testing and vulnerability management but also positions you for advancement in the booming field of cybersecurity.

CompTIA PenTest+ PT0-003 (V3) Logo
  • Free CompTIA PenTest+ PT0-003 (V3) Practice Test

  • 20 Questions
  • Unlimited
  • Engagement Management
    Reconnaissance and Enumeration
    Vulnerability Discovery and Analysis
    Attacks and Exploits
    Post-exploitation and Lateral Movement
Question 1 of 20

During the planning phase of a penetration-testing engagement, the consulting team assigns a unique asset tag to each production database server that the client has labeled as critical. Which of the following is the PRIMARY security benefit of adding these unique identifiers to the engagement documentation?

  • They allow testers to evade endpoint detection systems because the tags bypass signature matching.

  • They eliminate the need for a signed rules-of-engagement or other authorization documents.

  • They reduce the risk of accidentally testing assets that are out of scope by providing clear target identification.

  • They guarantee that denial-of-service or other disruptive exploits can be performed safely on the tagged systems.

Question 2 of 20

Which task is frequently carried out with this utility during host-based penetration efforts?

  • Obtain cryptographic key pairs for secure connections

  • Scan for known exploits on remote targets

  • Erase forensic logs on compromised devices

  • Extract authentication data from memory on Windows systems

Question 3 of 20

A tester identifies an older library in an application with a known path for code execution. The organization states they cannot remove it at this time. Which action helps highlight the severity of this weakness for planning remediation steps?

  • Conclude that it remains safe because filtering stops related network requests

  • Provide an example that demonstrates the code execution flaw

  • Suggest eliminating it and directing traffic elsewhere

  • Rename the library and isolate it within the environment

Question 4 of 20

Which utility is recommended for generating infiltration modules that can be adapted for different targets and integrated with frameworks?

  • Netcat

  • Hydra

  • Responder

  • msfvenom

Question 5 of 20

During an external penetration test you discover a short-lived session token for an administrative account embedded in a public Git repository. Which of the following best explains why this finding is considered high severity?

  • An attacker who obtains the token before it expires can perform privileged actions without needing to provide credentials.

  • Because the token expires quickly, defenders will not be able to recover forensic evidence, making incident response impossible.

  • Short-lived tokens are encrypted in transit and cannot be reused even if intercepted, so the impact is negligible.

  • Modern browsers automatically detect and invalidate leaked session tokens, so actual exploitation is unlikely.

Question 6 of 20

A company uses an automated process that grants advanced rights to every newly created account. Testing reveals that these privileged accounts have been modifying critical options far beyond their intended scope. Which action is the best approach to reduce large-scale unauthorized changes?

  • Implement frequent credential rotation for accounts granted elevated permissions

  • Apply stronger passphrase policies across newly created high-privilege accounts

  • Schedule role reviews and remove advanced permissions from accounts without valid business needs

  • Activate extra authentication checks for all recently issued accounts

Question 7 of 20

A penetration tester has gained initial access to a web server protected by a strict stateful firewall. The firewall's policy denies all inbound connections but permits established and related outbound traffic. To gain interactive command-line access, the tester uses a payload that forces the compromised server to connect back to a listener on the tester's attack machine. Which technique is the tester using?

  • Web shell

  • Reverse shell

  • Bind shell

  • Pivoting

Question 8 of 20

A penetration tester is conducting reconnaissance on a web application. The tester suspects that older, unlinked pages containing sensitive information may still be active on the web server. Which of the following tools is specifically designed to discover the paths of these historical web pages by reviewing archived versions of the site?

  • Shodan

  • WHOIS

  • Wayback Machine

  • Nmap

Question 9 of 20

During a penetration test, you have obtained an elevated Meterpreter session on a Windows workstation through Metasploit. You must collect the local SAM password hashes so that you can attempt pass-the-hash authentication on nearby hosts. Which built-in Meterpreter action accomplishes this with the least impact on the target user?

  • Enable the WDigest registry setting to capture plaintext credentials after reboot

  • Execute the ps command and save the process list for later analysis

  • Run the hashdump command (or smart_hashdump module) to dump SAM hashes

  • Upload and launch an external Mimikatz binary from disk to dump credentials

Question 10 of 20

A penetration tester notices that a discovered issue is not identified in the scan results. Which description best fits this occurrence?

  • An event where connectivity interference affects the completeness of reporting

  • A process that confirms an actual gap afterward

  • A situation in which an issue remains unidentified by the scanning process

  • A flagged instance where a harmless service was mistakenly listed

Question 11 of 20

During the kickoff meeting, the client emails your team three internal /24 network ranges, two public IP blocks, and several fully qualified domain names that must be assessed during a one-week test window. The client also warns that cloud-hosted assets may appear during discovery. Which action will best ensure the testing stays strictly within the authorized boundaries?

  • Obtain a precise list from the client and confirm it matches the agreement, removing any unspecified addresses

  • Gather information from all addresses to identify anything that responds and include them in the test

  • Exclude addresses that do not return active responses during initial scans

  • Investigate additional endpoints if they appear during scans to cover all potential weaknesses

Question 12 of 20

During an assessment, a tester has gained valid credentials on a target server that supports a secure protocol for remote terminal access. The tester wants to maintain an encrypted, key-based connection for future sessions with minimal system disruptions. Which approach is the best method for accomplishing this?

  • Add public key data to the legitimate user's configuration file

  • Modify the firewall to forward inbound requests to a hidden port

  • Implement a custom service that starts a local script upon every boot

  • Inject a Trojan in a library so commands run whenever the server restarts

Question 13 of 20

When a penetration tester is mapping firewall rules for Microsoft Windows hosts, which statement accurately describes the ports used by Remote Procedure Call (RPC) with Distributed Component Object Model (DCOM)?

  • Session establishment occurs on TCP 135, and all remaining RPC/DCOM traffic continues over a dynamically selected high-numbered port.

  • The client connects on TCP 139 for setup, and traffic is then tunneled through TCP 445.

  • Both session setup and all data transfer use only TCP 135.

  • Communication relies exclusively on UDP 137 for name service and data transfer.

Question 14 of 20

During an internal penetration test, you notice a threat actor using the built-in Windows tools "certutil.exe" and "rundll32.exe" to download and execute malicious code. No antivirus alerts were generated because both binaries are digitally signed by Microsoft and are commonly used by system administrators.

Which attack technique BEST describes the adversary's use of these trusted system executables to evade detection?

  • Exploiting a zero-day vulnerability

  • Leveraging living-off-the-land binaries (LOLBins)

  • Performing DLL sideloading

  • Launching a watering-hole attack

Question 15 of 20

During the final stage of a test, modifications were made to security parameters, including firewall rules and registry entries. The team needs to return the system to its previous state with the least risk of incomplete reversion. Which approach is the best for returning this system to its prior state?

  • Re-image the system from a backup that was created before any testing was conducted

  • Disable any new user accounts introduced and stop the services they created

  • Uninstall the tools used during the test and leave network configuration updates in place

  • Manually remove the changes listed in the firewall logs and then rebuild the registry entries

Question 16 of 20

A penetration tester is conducting an internal assessment and discovers a newly deployed database server. The server is configured with the vendor's default administrator credentials and is missing several critical security patches. The rules of engagement (RoE) prioritize system stability and prohibit any actions that could cause unplanned downtime. Which of the following remediation actions should the tester recommend as the most effective initial step?

  • Configure a host-based intrusion detection system (HIDS) to alert on login attempts.

  • Change the default administrator password to a complex value and disable the account if it is not required.

  • Immediately deploy all missing critical security patches to the server.

  • Place the server in a quarantined network segment until the next scheduled maintenance window.

Question 17 of 20

During a client engagement, you are asked to identify every page exposed by a site with numerous nested links and dynamic menus. Which method helps aggregate all reachable content throughout the site?

  • Run broad port scans on the target host to find site pages on open ports

  • Attempt to gather credentials for domain accounts to see if they lead to extra directories

  • Initiate a zone transfer on the domain to uncover all subdomains and attached folders

  • Use an automated tool that fetches each linked reference from discovered pages to reveal additional layers

Question 18 of 20

A consultant is launching a phishing campaign to gather employees’ account details. The consultant wants to appear as a familiar colleague and embed a link that collects credentials while avoiding suspicious behavior. Which plan is the most likely to succeed?

  • Announce an urgent update request to the entire staff with minimal sender details and attach a script reported to fix email synchronization issues

  • Use a disguised coworker name referencing an active project, include a link that resembles the company’s login portal, and request sign-in

  • Offer a complimentary gift card if individuals forward their credentials to a newly created mailbox within a short timeframe

  • Send a message from a generic external domain with a blank subject field that instructs users and managers to respond with account details

Question 19 of 20

During a reconnaissance effort, a team uncovers hostnames by referencing known addresses. Which of the following is the best outcome from applying this method?

  • More insight into resources that are not found with forward queries

  • Acquiring authentication credentials from the zone files

  • Matching each address with a definitive roster of valid servers

  • Overwriting existing zone records to reroute traffic

Question 20 of 20

A pentester is reviewing financial transactions and discovers that a single staff member rarely steps away from daily tasks. The team suggests requiring scheduled leave periods for each member. Which factor best explains why that recommendation can help detect hidden irregularities?

  • It creates an opportunity for different individuals to perform repetitive processes and spot troubling activities

  • It shifts attention to external threats by moving staff off critical tasks for extended periods

  • It reduces daily responsibilities for staff and decreases time spent investigating internal issues

  • It improves morale by offering additional leisure options for personnel