00:20:00

CompTIA PenTest+ Practice Test (PT0-003)

Use the form below to configure your CompTIA PenTest+ Practice Test (PT0-003). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA PenTest+ PT0-003 (V3)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA PenTest+ PT0-003 (V3) Information

CompTIA PenTest+ (PT0-003) is a professional cybersecurity certification designed for practitioners focusing on penetration testing and vulnerability assessment. It is an intermediate-level exam in CompTIA’s cybersecurity pathway, typically pursued after foundational certifications like Security+, and serves as the offensive or “red team” counterpart to the defensive CySA+ certification. The latest version (exam code PT0-003) updates the content to include modern technologies and threats, such as cloud and mobile environments, to ensure it remains relevant in today’s landscape. Below, we provide an overview of the exam structure, the key benefits of earning PenTest+ certification, and practical tips for studying and preparation.

Exam Structure and Format

The PenTest+ PT0-003 exam tests a broad range of penetration testing knowledge and skills. The exam consists of up to 90 questions in a 165-minute session. Questions are a mix of multiple-choice and performance-based items, meaning candidates must not only answer conceptual questions but also perform simulated penetration testing tasks. The exam is scored on a scale of 100–900, with a passing score of 750. CompTIA recommends that candidates have about 3–4 years of hands-on experience in information security or a related field before attempting this exam.

Exam Domains: The PenTest+ PT0-003 objectives are divided into five domains, each representing a key subject area and a percentage of the exam coverage:

  • Engagement Management – 13%
  • Reconnaissance and Enumeration – 21%
  • Vulnerability Discovery and Analysis – 17%
  • Attacks and Exploits – 35%
  • Post-Exploitation and Lateral Movement – 14%

This structure ensures that the exam covers the entire penetration testing process end-to-end, from initial planning through exploitation and reporting. Because the exam includes performance-based questions, candidates should be prepared to perform tasks such as using tools or analyzing attack outputs in a simulated environment.

Benefits of Obtaining the PenTest+ Certification

Earning the CompTIA PenTest+ certification can significantly boost a cybersecurity professional’s career progression, especially for those specializing in offensive security roles. PenTest+ is globally recognized and even approved by the U.S. Department of Defense as a baseline certification for several cybersecurity job categories, underscoring its credibility in the industry.

One of the standout benefits of PenTest+ is its emphasis on practical skills. Unlike some certifications that are purely theoretical, PenTest+ includes hands-on, performance-based evaluation. This means certified individuals have proven they can perform real-world penetration testing tasks – planning engagements, exploiting vulnerabilities, and then analyzing and reporting the results – not just answer questions about them.

Professionally, PenTest+ opens doors to roles such as penetration tester, vulnerability assessment analyst, security analyst, and more. These roles are in high demand as organizations seek to bolster their defenses with skilled ethical hackers. Achieving PenTest+ demonstrates to employers that you possess a well-rounded skill set: you can identify weaknesses, exploit them to gauge impact, and recommend mitigations. This can make you a strong candidate for promotions or new job opportunities in the cybersecurity field.

Study and Preparation Tips

Preparing for the PenTest+ PT0-003 requires a combination of knowledge review and hands-on practice. Here are some vendor-neutral tips to help you get ready for the exam:

  • Review the Official Objectives: Start by downloading the CompTIA PenTest+ PT0-003 exam objectives and use them as a checklist. Make sure you understand each topic listed in the five domains. This ensures you cover all required knowledge areas, from engagement planning to post-exploitation processes.

  • Build Hands-On Skills: Given the exam’s practical components, set up a lab environment (using virtual machines or cloud instances) to practice penetration testing techniques. Work with common tools and frameworks like Nmap, Metasploit, Wireshark, and Burp Suite to perform scanning, exploitation, password cracking, and other tasks.

  • Understand Concepts in Context: Don’t just memorize definitions – learn how to apply concepts in real scenarios. The exam often presents scenario-based questions that require critical thinking to identify the best solution or root cause rather than straightforward recall.

  • Practice Time Management: You’ll have 165 minutes for a maximum of 90 questions, some of which may be complex tasks. Practice solving questions under timed conditions. A common strategy is to quickly answer all the multiple-choice questions first, then allocate remaining time to the performance-based tasks.

  • Take Practice Exams: Utilize reputable practice exams to test your knowledge and readiness. Practice tests help identify your weak areas and familiarize you with the exam format.

  • Study Reporting and Best Practices: Remember that penetration testing isn’t just about hacking into systems – it’s also about documenting findings and recommending fixes. Be prepared for questions on writing reports, communicating results to stakeholders, and adhering to legal/ethical standards.

By following these preparation strategies and thoroughly covering the exam domains, you’ll build both the knowledge and the practical know-how needed to succeed on the PenTest+ PT0-003 exam. Achieving this certification not only validates your skills in penetration testing and vulnerability management but also positions you for advancement in the booming field of cybersecurity.

CompTIA PenTest+ PT0-003 (V3) Logo
  • Free CompTIA PenTest+ PT0-003 (V3) Practice Test

  • 20 Questions
  • Unlimited time
  • Engagement Management
    Reconnaissance and Enumeration
    Vulnerability Discovery and Analysis
    Attacks and Exploits
    Post-exploitation and Lateral Movement

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

Which detail is most important to finalize before starting an evaluation so that boundaries, constraints, and roles are clear? Choose the best answer.

  • A plan for obtaining specialized scanning applications

  • A checklist capturing known vulnerabilities of all assets

  • An agreement specifying permitted targets, prohibited zones, and how to handle unexpected findings

  • A schedule of recurring status meetings after the first discovery phase

Question 2 of 20

During contract negotiations for a six-week internal and external penetration test, the consulting firm will receive access to architecture diagrams, unreleased source code, and limited customer data. The client's legal team insists that any sensitive information exchanged must remain confidential during the engagement and after final reporting. In addition to the master service agreement and a detailed statement of work, which specific contract should both organizations sign to bind everyone-including subcontractors-to strict confidentiality of all proprietary information disclosed?

  • An indemnification clause within the master service agreement

  • A mutual nondisclosure agreement that applies to all parties

  • A service-level agreement defining uptime and performance thresholds

  • A statement of work that itemizes deliverables and milestones

Question 3 of 20

A consultant is preparing for an assessment of a web platform that stores real user details. The testing environment, scheduled for next week, has been found to contain user information. Which approach is recommended to maintain data protection requirements before starting the project?

  • Continue testing as is, relying on the development team for patching.

  • Encrypt sensitive details in the environment before testing begins.

  • Proceed with testing after obtaining prior approval from the project sponsor.

  • Anonymize user records before using the data in the test environment.

Question 4 of 20

A client's new assessment requires compliance with data protection guidelines. Which approach is BEST for ensuring that the test scope meets the required security standards while addressing privacy concerns?

  • Limit testing to external endpoints and exclude the internal network

  • Focus on technical testing of internal systems and avoid mentioning legal guidelines

  • Conduct broad intrusion tests on every system to discover more issues

  • Develop a plan that covers recognized standards, addresses personal data handling, and clarifies roles and acceptance criteria

Question 5 of 20

During a reconnaissance effort, a team uncovers hostnames by referencing known addresses. Which of the following is the best outcome from applying this method?

  • Overwriting existing zone records to reroute traffic

  • Matching each address with a definitive roster of valid servers

  • More insight into resources that are not found with forward queries

  • Acquiring authentication credentials from the zone files

Question 6 of 20

A security engineer suspects that a name server is leaking internal host details that do not typically appear in casual lookups. Which method best verifies that a name server is exposing details that are not visible to straightforward queries?

  • Perform reverse lookups on each suspected record

  • Initiate a direct zone copy from the suspect name server

  • Scan the site with a domain crawler to list all paths

  • Compare historical domain snapshots for hidden data

Question 7 of 20

During an external engagement, a penetration tester maps the client's public DNS information. Several hosts are found listening on TCP ports 25 and 587, but the tester still needs to learn which fully qualified domain name the organization advertises as its official inbound email gateway. Which DNS query will most reliably identify that host?

  • Perform a port scan to list hosts listening on SMTP ports

  • Query the domain's MX record

  • Request a full AXFR zone transfer from the authoritative server

  • Send ICMP echo requests to the entire /24 subnet

Question 8 of 20

While coordinating an assessment, the client mentions limited staff and upcoming maintenance within a set timeframe. Which approach best addresses these constraints and still meets the assessment objectives?

  • Arrange a suitable timeframe by consulting with the appropriate stakeholders

  • Postpone the effort until operational demands are reduced

  • Commence activities soon to capture spontaneous responses

  • Adhere to the previously planned date, acknowledging overlaps

Question 9 of 20

A firm with global clients wants to follow a broad legal requirement that enforces protections for individuals' personal data and privacy rights across multiple jurisdictions. Which regulation or standard best satisfies these obligations?

  • Open Source Security Testing Methodology Manual targeting assessment strategies

  • GDPR reflecting various obligations for individual rights

  • Payment Card Industry Data Security Standard focusing on transaction oversight

  • NIST SP 800-53 emphasizing federal requirements

Question 10 of 20

During final coordination with a client, they reveal that certain database servers must not be examined to meet internal regulations. Which step helps guarantee these restrictions remain in place during the security review?

  • Include them in documentation for analysis, but avoid exploitation efforts

  • Conduct limited assessments to ensure their protection

  • Record those specific servers in the engagement documentation to ensure they are documented as out of scope

  • Document verbal agreements regarding internal restrictions

Question 11 of 20

A security analyst is hired to assess a software company. The analyst plans to gather information from public sources as well as conduct a network probe. Which tactic is most likely to avoid detection by the company's internal monitoring systems?

  • Sending crafted protocol requests to the organization's servers to retrieve banner details

  • Capturing network packets from internal systems at the company

  • Using a network scanner to enumerate open services on the target

  • Reviewing job boards for relevant postings about the company's technology stack

Question 12 of 20

A company's IT department has announced that its internal payroll and inventory applications are being re-architected as independent microservices. During external OSINT reconnaissance, which technique would most likely uncover previously unknown endpoints that host those microservices so you can plan deeper enumeration?

  • Search leaked credential dumps for reused passwords

  • Perform password-spray attacks against the corporate VPN

  • Enumerate DNS records and certificate-transparency logs for subdomains

  • Social-engineer access to internal container logs

Question 13 of 20

While examining a company's presence on social media, an analyst wants to identify current job titles, email patterns, and areas of expertise. Which approach is best?

  • Send requests to each user profile for a closer look

  • Repeat scans of the organization's perimeter to see if staff data emerges

  • Attempt to bypass the platform's internal administrative features

  • Build targeted queries using advanced search filters to highlight key words

Question 14 of 20

A security tester suspects that a company's hiring advertisements reveal information about systems and software versions. Which activity gathers the most valuable details directly from those advertisements?

  • Analyze public code repositories for access token exposure

  • Compile staff contact details from online directories

  • Examine requirements and responsibilities mentioned for different positions

  • Check certificate logs for newly registered subdomains

Question 15 of 20

While assessing a web application, you detect a critical weakness that allows unauthorized commands to run on the server. The designated contact is not replying, and the business is exposed. Which action addresses this pressing concern?

  • Send a notification to the backup individual named in the project contact plan

  • Correlate evidence about the vulnerability and wait for the next scheduled briefing so everyone learns about the risk

  • Conclude all evaluations and summarize the vulnerability in the finalized report

  • Turn off the targeted server to halt suspicious activities until a response is received

Question 16 of 20

Which method best clarifies the allowed and disallowed segments for an assessment?

  • Requiring higher-level executives to sign an agreement to protect classified information

  • Conducting a peer review to confirm the significance of each finding

  • Including permitted network ranges and prohibited targets in a formal contract

  • Discussing relevant industry regulations before tests begin

Question 17 of 20

During a network penetration test, a tester discovers a previously unknown host that was not listed in the Statement of Work (SoW). According to standard rules of engagement, what is the MOST appropriate immediate action?

  • Continue the engagement and perform a full vulnerability scan on the discovered host to provide extra value.

  • Perform only basic reconnaissance on the host to determine its function before proceeding.

  • Ignore the host completely since it is out of scope and do not include it in the final report.

  • Stop all activity related to the host, document the finding, and contact the client for guidance.

Question 18 of 20

A penetration tester is finalizing the Rules of Engagement (RoE) for a web application assessment. The client has specified that the tester must verify whether the user authentication page is vulnerable to SQL injection and if the customer search function is susceptible to stored cross-site scripting. To ensure these requirements are met with a repeatable and verifiable methodology, what should the tester create and include in the engagement plan?

  • A list of target URLs and IP addresses to define the overall scope of the assessment.

  • A threat modeling framework like STRIDE to generally categorize potential threats to the application.

  • An executive summary outlining the high-level goals and potential business impact of the engagement.

  • Test cases that detail the exact steps, tools, and expected outcomes for each specific vulnerability check.

Question 19 of 20

During an internal penetration test, a security consultant must review several long-lived feature branches in a company's Git repository to identify accidental credential exposure. Which of the following approaches will MOST effectively reveal API keys, hashed passwords, and other secrets that may have been committed throughout the project history?

  • Reviewing open issues for references to private configuration details

  • Banning specific keywords in commit messages that may indicate sensitive data

  • Manually combing through each commit for exposed credentials

  • Running a dedicated secret-scanning tool that analyzes the full Git history for multiple credential patterns

Question 20 of 20

Which approach is the BEST to discover credentials that were accidentally left in publicly accessible version control data?

  • Track changes in domain ownership records looking for newly registered variants

  • Search commit histories with specialized queries for strings that match potential secrets

  • Check logs that reveal new subdomains associated with the project

  • Monitor social media hashtags that reference the project or developer names