The CompTIA PenTest+ (PT0-003) validates the technical skills required to plan, conduct, and report on vulnerability assessments and penetration tests. it covers the use of various tools and techniques to identify and exploit security weaknesses in an organization's systems. Professionals with the symbol COMP_PEN_TEST are recognized for their ability to simulate real-world attacks and recommend effective defenses.
---------- Question 1
After running an unauthenticated vulnerability scan, a report indicates a critical SQL injection vulnerability on a web application that the development team claims was recently patched. What is the most crucial next step for the penetration tester?
- Immediately report the finding as valid
- Re-run the scan with different parameters
- Attempt to manually validate the finding to confirm its existence
- Dismiss the finding as a false positive
---------- Question 2
A penetration tester wants to gather information about a target organization's public-facing employees, technologies used, and company structure without directly interacting with their systems. Which reconnaissance method is best suited for this objective?
- Active port scanning
- Network sniffing
- Open-Source Intelligence OSINT
- Authenticated vulnerability scanning
---------- Question 3
A penetration tester is drafting the executive summary for a final report. The target audience includes senior management who lack deep technical expertise but need to understand the business impact. Which element should be emphasized most in this section?
- Comprehensive list of all exploited vulnerabilities with CVE IDs.
- Detailed technical steps for each successful exploit chain.
- A high-level overview of the significant risks, their business impact, and strategic recommendations.
- Analysis of network traffic captures demonstrating the attack vectors.
---------- Question 4
A penetration tester needs to automate the collection of HTTP headers from a list of 100 web servers for reconnaissance. Which scripting language and corresponding library would be most efficient for this task in a Linux environment?
- PowerShell with Invoke-WebRequest
- Python with requests library
- Bash script with ping
- Ruby with Mechanize
---------- Question 5
During a penetration test, a tester encounters a critical system misconfiguration that could lead to widespread service disruption if exploited. The testing window is still open for several days. Which communication protocol should the tester follow to ensure proper stakeholder alignment and risk articulation without prematurely ending the test?
- Document the finding and include it only in the final report
- Immediately shut down the system to prevent disruption
- Follow the pre-defined escalation path to report the high-risk finding
- Send an informal email to the client contact detailing the issue
---------- Question 6
Before initiating any active penetration testing activities, what critical authorization document must be obtained and clearly define the legal boundaries of the engagement?
- A Non-Disclosure Agreement NDA
- A Service Level Agreement SLA
- A Get Out Of Jail Free card
- A Rules of Engagement ROE document
---------- Question 7
A penetration tester needs to gather information about an organizations public facing assets including exposed documents and employee details. Which tool or technique is most effective for passive intelligence gathering from publicly available sources?
- Nmap for port scanning
- Wireshark for network sniffing
- Shodan for internet-connected device search
- Active directory enumeration
---------- Question 8
A penetration tester is performing a vulnerability scan on a web application. To ensure the scanner can accurately identify vulnerabilities within authenticated areas of the application, what type of scanning should be employed?
- Unauthenticated scanning
- Static Application Security Testing (SAST)
- Authenticated scanning
- Port scanning
---------- Question 9
A PenTest team is finalizing their report for the client. They need to provide a high-level overview for executives and detailed technical sections for IT staff. Which report component effectively addresses the executive audience requirements?
- Findings and observations
- Remediation recommendations
- Executive summary
- Technical appendices
---------- Question 10
A penetration tester is performing passive reconnaissance on a target company. Which activity would be considered within the scope of passive reconnaissance?
- Launching an Nmap SYN scan against the public IP range of the company.
- Intercepting network traffic on the internal LAN segment of the company.
- Analyzing publicly available job postings on LinkedIn for technology stack information.
- Attempting to connect to open ports discovered via a port scan.
Are they useful?
Click here to get 540 more questions to pass this certification at the first try! Explanation for each answer is included!
Follow the below LINKEDIN channel to stay updated about 89+ exams!

Comments
Post a Comment