Free CompTIA PenTest+ Exam PT0-003 Exam Practice Test

UNLOCK FULL
PT0-003 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 27
Total Questions: 131
  • During a penetration testing engagement, a tester targets the internet-facing services used by the client. Which of the following describes the type of assessment that should be considered in this scope of work?

    Answer: C Next Question
  • During an engagement, a penetration tester needs to break the key for the Wi-Fi network that uses WPA2 encryption. Which of the following attacks would accomplish this objective?

    Answer: D Next Question
  • Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?

    Answer: A Next Question
  • Before starting an assessment, a penetration tester needs to scan a Class B IPv4 network for open ports in a short amount of time. Which of the following is the best tool for this task?

    Answer: B Next Question
  • A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?

    Answer: C Next Question
  • A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application's end users. Which of the following tools should the tester use for this task?

    Answer: A Next Question
  • Which of the following is most important when communicating the need for vulnerability remediation to a client at the conclusion of a penetration test?

    Answer: B Next Question
  • A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings,and high-level statements. Which of the following sections of the report would most likely contain this information?

    Answer: C Next Question
  • A penetration tester gains initial access to an endpoint and needs to execute a payload to obtain additional access. Which of the following commands should the penetration tester use?

    Answer: B Next Question
  • A penetration tester creates a list of target domains that require further enumeration. The tester writes the following script to perform vulnerability scanning across the domains:line 1: #!/usr/bin/bashline 2: DOMAINS_LIST = "/path/to/list.txt" line 3: while read -r i; doline 4: nikto -h $i -o scan-$i.txt & line 5: doneThe script does not work as intended. Which of the following should the tester do to fix the script?

    Answer: D Next Question
Page: 1 / 27
Total Questions: 131