Free CompTIA PenTest+ Exam PT0-003 Exam Practice Test
PT0-003 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 131
-
During a penetration testing engagement, a tester targets the internet-facing services used by the client. Which of the following describes the type of assessment that should be considered in this scope of work?
Answer: C Next Question -
During an engagement, a penetration tester needs to break the key for the Wi-Fi network that uses WPA2 encryption. Which of the following attacks would accomplish this objective?
Answer: D Next Question -
Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?
Answer: A Next Question -
Before starting an assessment, a penetration tester needs to scan a Class B IPv4 network for open ports in a short amount of time. Which of the following is the best tool for this task?
Answer: B Next Question -
A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?
Answer: C Next Question -
A penetration tester would like to leverage a CSRF vulnerability to gather sensitive details from an application's end users. Which of the following tools should the tester use for this task?
Answer: A Next Question -
Which of the following is most important when communicating the need for vulnerability remediation to a client at the conclusion of a penetration test?
Answer: B Next Question -
A penetration tester is compiling the final report for a recently completed engagement. A junior QA team member wants to know where they can find details on the impact, overall security findings,and high-level statements. Which of the following sections of the report would most likely contain this information?
Answer: C Next Question -
A penetration tester gains initial access to an endpoint and needs to execute a payload to obtain additional access. Which of the following commands should the penetration tester use?
Answer: B Next Question -
A penetration tester creates a list of target domains that require further enumeration. The tester writes the following script to perform vulnerability scanning across the domains:line 1: #!/usr/bin/bashline 2: DOMAINS_LIST = "/path/to/list.txt" line 3: while read -r i; doline 4: nikto -h $i -o scan-$i.txt & line 5: doneThe script does not work as intended. Which of the following should the tester do to fix the script?
Answer: D Next Question
Total Questions: 131
