- 299 Actual Exam Questions
- Compatible with all Devices
- Printable Format
- No Download Limits
- 90 Days Free Updates
Get All CompTIA PenTest+ Exam Questions with Validated Answers
| Vendor: | CompTIA |
|---|---|
| Exam Code: | PT0-003 |
| Exam Name: | CompTIA PenTest+ Exam |
| Exam Questions: | 299 |
| Last Updated: | March 22, 2026 |
| Related Certifications: | CompTIA PenTest+ |
| Exam Tags: | Cybersecurity certifications Intermediate CompTIA Cybersecurity analystsPenetration Tester |
Looking for a hassle-free way to pass the CompTIA PenTest+ Exam? DumpsProvider provides the most reliable Dumps Questions and Answers, designed by CompTIA certified experts to help you succeed in record time. Available in both PDF and Online Practice Test formats, our study materials cover every major exam topic, making it possible for you to pass potentially within just one day!
DumpsProvider is a leading provider of high-quality exam dumps, trusted by professionals worldwide. Our CompTIA PT0-003 exam questions give you the knowledge and confidence needed to succeed on the first attempt.
Train with our CompTIA PT0-003 exam practice tests, which simulate the actual exam environment. This real-test experience helps you get familiar with the format and timing of the exam, ensuring you're 100% prepared for exam day.
Your success is our commitment! That's why DumpsProvider offers a 100% money-back guarantee. If you don’t pass the CompTIA PT0-003 exam, we’ll refund your payment within 24 hours no questions asked.
Don’t waste time with unreliable exam prep resources. Get started with DumpsProvider’s CompTIA PT0-003 exam dumps today and achieve your certification effortlessly!
A penetration tester uses a reverse shell to maintain connectivity to a target network. During the final phase of the exercise, the penetration tester removes the reverse shell. Which of the following is an example of these activities?
Comprehensive and Detailed
A reverse shell that is left on a target to maintain access is a form of persistence/backdoor. The action described --- removing the reverse shell at the end of the engagement --- is specifically the removal of a persistence mechanism. Post-engagement cleanup requires removal of any artifacts that provide continued access (web shells, scheduled tasks, reverse shells, cron jobs, created accounts, etc.) so the environment is returned to its pre-test state and to prevent later compromise.
Why not the others:
B (Uninstalling tools): Removing tools is also a cleanup activity, but the question explicitly references removing the reverse shell (persistence).
C (Preserving artifacts): Preserving artifacts is the opposite (saving logs/evidence) for incident response --- not removing access.
D (Reverting configuration changes): Important, but the best single match for removing a reverse shell is ''removing persistence mechanisms.''
[Attacks and Exploits]
Which of the following protocols would a penetration tester most likely utilize to exfiltrate data covertly and evade detection?
Covert data exfiltration is a crucial aspect of advanced penetration testing. Penetration testers often need to move data out of a network without being detected by the organization's security monitoring tools. Here's a breakdown of the potential methods and why DNS is the preferred choice for covert data exfiltration:
FTP (File Transfer Protocol) (Option A):
Characteristics: FTP is a clear-text protocol used to transfer files.
Drawbacks: It is easily detected by network security tools due to its lack of encryption and distinctive traffic patterns. Most modern networks block or heavily monitor FTP traffic to prevent unauthorized file transfers.
HTTPS (Hypertext Transfer Protocol Secure) (Option B):
Characteristics: HTTPS encrypts data in transit, making it harder to inspect by network monitoring tools.
Drawbacks: While HTTPS is more secure, large amounts of unusual or unexpected HTTPS traffic can still trigger alerts on sophisticated security systems. Its usage for exfiltration depends on the network's normal traffic patterns and the ability to blend in.
SMTP (Simple Mail Transfer Protocol) (Option C):
Characteristics: SMTP is used for sending emails.
Drawbacks: Like FTP, SMTP is not inherently secure and can be monitored. Additionally, large or frequent email attachments can trigger alerts.
DNS (Domain Name System) (Option D):
Characteristics: DNS is used to resolve domain names to IP addresses and vice versa.
Advantages: DNS traffic is ubiquitous and often less scrutinized than other types of traffic. Data can be encoded into DNS queries and responses, making it an effective covert channel for exfiltration.
Conclusion: DNS tunneling stands out as the most effective method for covert data exfiltration due to its ability to blend in with normal network traffic and avoid detection by conventional security mechanisms. Penetration testers utilize this method to evade scrutiny while exfiltrating data.
[Attacks and Exploits]
A penetration tester gains access to the target network and observes a running SSH server.
Which of the following techniques should the tester use to obtain the version of SSH running on the target server?
Banner grabbing is used to extract version information from services, including SSH, FTP, and web servers.
Option A (Network sniffing) : Captures packets, but does not directly reveal service versions.
Option B (IP scanning) : Identifies active hosts, but not SSH versions.
Option C (Banner grabbing) : Correct.
Can be performed with:
nc <target> 22
or
telnet <target> 22
Option D (DNS enumeration) : Retrieves domain name records, not SSH versions.
Reference: CompTIA PenTest+ PT0-003 Official Guide -- Service Enumeration & Banner Grabbing
[Tools and Code Analysis]
A consultant starts a network penetration test. The consultant uses a laptop that is hardwired to the network to try to assess the network with the appropriate tools. Which of the following should the consultant engage first?
In network penetration testing, the initial steps involve gathering information to build an understanding of the network's structure, devices, and potential entry points. The process generally follows a structured approach, starting from broad discovery methods to more specific identification techniques. Here's a comprehensive breakdown of the steps:
Host Discovery (Answer: C):
Objective: Identify live hosts on the network.
Tools & Techniques:
Ping Sweep: Using tools like nmap with the -sn option (ping scan) to check for live hosts by sending ICMP Echo requests.
ARP Scan: Useful in local networks, arp-scan can help identify all devices on the local subnet by broadcasting ARP requests.
nmap -sn 192.168.1.0/24
Reference:
The GoBox HTB write-up emphasizes the importance of identifying hosts before moving to service enumeration.
The Forge HTB write-up also highlights using Nmap for initial host discovery in its enumeration phase.
Service Discovery (Option A):
Objective: After identifying live hosts, determine the services running on them.
Tools & Techniques:
Nmap: Often used with options like -sV for version detection to identify services.
nmap -sV 192.168.1.100
Reference:
As seen in multiple write-ups (e.g., Anubis HTB and Bolt HTB), service discovery follows host identification to understand the services available for potential exploitation.
OS Fingerprinting (Option B):
Objective: Determine the operating system of the identified hosts.
Tools & Techniques:
Nmap: With the -O option for OS detection.
nmap -O 192.168.1.100
Reference:
Accurate OS fingerprinting helps tailor subsequent attacks and is often performed after host and service discovery, as highlighted in the write-ups.
DNS Enumeration (Option D):
Objective: Identify DNS records and gather subdomains related to the target domain.
Tools & Techniques:
dnsenum, dnsrecon, and dig.
dnsenum example.com
DNS enumeration is crucial for identifying additional attack surfaces, such as subdomains and related services. This step is typically part of the reconnaissance phase but follows host discovery and sometimes service identification.
Conclusion: The initial engagement in a network penetration test is to identify the live hosts on the network (Host Discovery). This foundational step allows the penetration tester to map out active devices before delving into more specific enumeration tasks like service discovery, OS fingerprinting, and DNS enumeration. This structured approach ensures that the tester maximizes their understanding of the network environment efficiently and systematically.
A penetration tester identifies the following vulnerability during a scan of the company's network:
Severity: HIGH
Vulnerability: ABC Load Balancer: Alpha OS httpd TLS vulnerability
An Nmap scan of the affected device produces the following results:
Host is up (0.0000040s latency).
Not shown: 98 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp closed https
Which of the following best describes this scenario?
Comprehensive and Detailed
The vulnerability report identifies a TLS vulnerability on port 443 (HTTPS). However, the Nmap scan shows port 443 as closed, meaning the service is not running or reachable.
If the service associated with the vulnerability is not active, the reported issue cannot be valid. Therefore, the scan result contradicts the finding --- making it a false positive (the scanner incorrectly flagged a vulnerability that doesn't exist).
Why not the others:
A . True negative: Would mean no vulnerability exists and none was reported.
B . True positive: Would mean both the scan and vulnerability report agree that the service is running and vulnerable --- not the case here.
C . False negative: Would mean a vulnerability exists but was not detected --- also not the case.
CompTIA PT0-003 Mapping:
Domain 2.0: Information Gathering and Vulnerability Scanning
Security & Privacy
Satisfied Customers
Committed Service
Money Back Guranteed