Limited Time Offer: Use code CERTLABS10Copied! for 10% off your first subscription!

Free CompTIA PenTest+ Practice Test (PT0-003) 2026

Prove your offensive security knowledge with free PenTest+ practice questions covering engagement planning, reconnaissance, exploitation, post-exploitation, and professional reporting.

0Max Questions
0Passing Score (/900)
0Minutes
0Years Valid

The CompTIA PenTest+ (PT0-003) validates the skills needed to plan, execute, and report on penetration tests. It bridges the gap between Security+ and OSCP, testing both conceptual and applied pen-testing methodology. Download the official CompTIA PenTest+ PT0-003 Exam Objectives for complete domain coverage.

CompTIA PenTest+ certification badge
CompTIA PenTest+ validates penetration testing and vulnerability assessment skills

PenTest+ Practice Quiz

Score:0 / 0 (10 questions total)

1. A penetration tester is reviewing the document excerpt shown below before starting an external assessment. The document defines the testing window, source IPs, in-scope and out-of-scope assets, permitted techniques, and emergency contacts. What is this document commonly called in PT0-003 terminology?

📄 Engagement Document — Excerpt
Authorized testing window: 2026-06-01 02:00 UTC → 2026-06-07 06:00 UTC
Source IP allow-list: 203.0.113.44/32, 203.0.113.45/32
In-scope CIDRs: 10.50.0.0/22, app.acme-corp.com (prod)
Out-of-scope: payroll-db.acme.local, *.partners.acme.com
Permitted techniques: external recon, web app testing, password spraying (max 3 attempts/account/hour)
Forbidden: DoS, social engineering of C-suite, data exfil >100 MB
Emergency POC: soc@acme-corp.com / +1-555-0142
Signed: James Whitfield (CISO), 2026-05-25
  • A Non-Disclosure Agreement (NDA)
  • B Statement of Work (SOW)
  • C Rules of Engagement (RoE) / Authorization letter
  • D Master Service Agreement (MSA)

Right answer (C): That's correct! The excerpt's content (testing window, source IP allow-list, scope boundaries, permitted/forbidden techniques, emergency POC) is the textbook structure of a Rules of Engagement (RoE) or authorization letter, which provides legal cover for the tester and operational guardrails.

Wrong answers:

  • A): An NDA only covers confidentiality of information learned during the engagement; it does not list IP ranges, time windows, or permitted techniques as shown.
  • B): The SOW describes deliverables, timelines, and pricing at a project level, not the technical testing boundaries shown in the excerpt.
  • D): The MSA governs the overall commercial relationship and would not contain test-specific details such as source IPs or attack techniques.

2. The Rules of Engagement explicitly excluded the acme_payroll_prod database from testing. While running sqlmap against the in-scope shop application, the tester sees the output below showing that a UNION-based injection has dumped 12,481 employee records from the out-of-scope payroll database. What is the tester's required next step?

attacker@kali: ~/engagement/sqlmap
$ sqlmap -u "https://shop.acme.com/product?id=42" --batch --dbs
[INFO] testing connection to the target URL
[INFO] heuristic (basic) test shows that GET parameter 'id' might be injectable
[INFO] testing for SQL injection on GET parameter 'id'
[INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
[INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL >= 5.0
available databases [4]:
[*] information_schema
[*] acme_shop_prod
[*] acme_payroll_prod   «« OUT-OF-SCOPE per RoE
[*] acme_shop_staging
[+] dumped 12,481 rows from acme_payroll_prod.employees (SSN, salary, DOB)
  • A Continue exploiting to demonstrate impact
  • B Stop immediately, document the finding, and notify the client
  • C Ignore the finding since the database is out of scope
  • D Attempt the injection on a staging database instead

Right answer (B): That's correct! As soon as the sqlmap output revealed data from the out-of-scope acme_payroll_prod database, the tester must stop, preserve the dump as evidence, and immediately notify the client POC defined in the RoE so legal and compliance teams can handle the spillover.

Wrong answers:

  • A): Continuing to exploit (e.g., dumping further tables) compounds the scope violation and exposes the tester to civil and possibly criminal liability under CFAA-style statutes.
  • C): Ignoring 12,481 leaked PII records would be negligent and a breach of the tester's professional duty to disclose.
  • D): Pivoting to acme_shop_staging is still unauthorized because the RoE only covered the production shop application and explicitly excluded other databases.

3. A tester compiled the intelligence sources shown in the table below during the first 48 hours of an engagement, and the "Traffic to Target?" column confirms no packets were sent to the client's infrastructure. Which PT0-003 reconnaissance category best describes the activities in this table?

🔎 OSINT Recon — First 48 Hours
SourceData ReturnedTraffic to Target?
whois acme-corp.comRegistrar, admin email, NS recordsNo
crt.sh (Certificate Transparency)71 historical subdomains, incl. dev-vpn, jenkins-oldNo
Shodan API org:"Acme Corp"14 hosts, banners, exposed RDP on 1 hostNo
LinkedIn / theHarvester312 employee names & titles, email formatNo
Google dorks site:acme-corp.com filetype:pdfInternal SOPs, org chart, network diagramNo
  • A Passive reconnaissance (OSINT)
  • B Active reconnaissance
  • C Network scanning
  • D Fuzzing

Right answer (A): That's correct! Every row in the table uses third-party data sources (WHOIS, crt.sh, Shodan, LinkedIn, Google) that return target intelligence without ever touching the client's network — the textbook definition of passive reconnaissance / OSINT.

Wrong answers:

  • B): Active reconnaissance directly probes the target with scans and banner grabbing, generating traffic that can be detected by IDS/IPS.
  • C): Network scanning is a specific form of active recon using tools like Nmap to identify open ports and services.
  • D): Fuzzing is an exploitation technique that sends malformed input to applications to find crashes, not a reconnaissance method.

4. A junior tester ran the command nmap -sS -sV -O -p- 192.168.1.0/24 and produced the output shown below. The scan took over 6 minutes and reported a high-numbered ephemeral port (49152) along with the standard services. Which statement most accurately describes what this single command accomplished against the /24 subnet?

root@kali: ~
root@kali:~# nmap -sS -sV -O -p- 192.168.1.0/24
Starting Nmap 7.94 ( https://nmap.org )
Nmap scan report for 192.168.1.10
Host is up (0.0021s latency).
Not shown: 65530 closed tcp ports (reset)
PORT      STATE SERVICE      VERSION
22/tcp    open  ssh          OpenSSH 8.2p1 Ubuntu
80/tcp    open  http         nginx 1.18.0
443/tcp   open  ssl/http     nginx 1.18.0
3306/tcp  open  mysql        MySQL 5.7.41
49152/tcp open  unknown
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5.4
OS details: Linux 5.4 - 5.6
Network Distance: 2 hops
Nmap done: 256 IP addresses (1 host up) scanned in 412.18 seconds
  • A Full TCP connect scan with OS detection only
  • B UDP scan of all ports with service versioning
  • C SYN stealth scan of the top 1000 ports with versioning
  • D SYN stealth scan of all 65,535 ports with service version and OS detection

Right answer (D): That's correct! The output line "Not shown: 65530 closed tcp ports" confirms all 65,535 ports were probed (-p-). The VERSION column proves -sV ran, the OS CPE/details lines prove -O ran, and -sS made it a half-open SYN stealth scan.

Wrong answers:

  • A): A full TCP connect scan would use -sT instead of -sS, and this command also includes service versioning so OS-only is wrong.
  • B): A UDP scan would require the -sU flag, which is not present in this command.
  • C): Without -p- Nmap defaults to the top 1000 ports, but -p- explicitly tells it to scan every port from 1 to 65,535.

5. The Nmap output below shows a fileserver still running Windows Server 2008 R2 SP1 with SMBv1 enabled, and the smb-vuln-ms17-010 NSE script flagged it as VULNERABLE. The tester wants to gain SYSTEM-level RCE. Which public exploit should be attempted first based on this evidence?

attacker@kali: ~/scans — nmap NSE
Nmap scan report for fileserver-01.corp.local (10.10.50.22)
Host is up (0.0017s latency).
PORT     STATE SERVICE      VERSION
135/tcp  open  msrpc        Microsoft Windows RPC
139/tcp  open  netbios-ssn  Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds Windows Server 2008 R2 SP1 7601
3389/tcp open  ms-wbt-server Microsoft Terminal Services
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1

Host script results:
| smb-os-discovery:
|   OS: Windows Server 2008 R2 SP1 (build 7601)
|   Computer name: FILESERVER-01
|_  System time: 2026-05-04T18:42:11-05:00
| smb-protocols:
|   dialects: 2.02, 2.10
|   SMBv1 enabled (NT LM 0.12)
| smb-vuln-ms17-010:
|   VULNERABLE: Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
  • A BlueKeep (CVE-2019-0708)
  • B EternalBlue / MS17-010
  • C Heartbleed (CVE-2014-0160)
  • D Log4Shell (CVE-2021-44228)

Right answer (B): That's correct! The Nmap NSE script literally returned "VULNERABLE" for smb-vuln-ms17-010 — that is EternalBlue, the SMBv1 RCE leaked from the NSA and weaponized by WannaCry/NotPetya. exploit/windows/smb/ms17_010_eternalblue in Metasploit is the textbook follow-up.

Wrong answers:

  • A): BlueKeep targets Remote Desktop Protocol on port 3389, not SMB on port 445.
  • C): Heartbleed is an OpenSSL vulnerability affecting HTTPS services on port 443, not Windows SMB.
  • D): Log4Shell is a Java deserialization flaw in the Log4j logging library, not present on a Windows SMB service.

6. The Burp Suite intercept below shows a login POST that the back end concatenates directly into a MySQL query, and a single-quote test on the username field returned a verbose SQL error. Given the response leaks query structure, which attack technique would be MOST effective to test for authentication bypass on this form?

🐞 Burp Suite — Proxy Intercept
POST /api/login HTTP/1.1
Host: portal.acme-corp.com
Content-Type: application/x-www-form-urlencoded
Content-Length: 42

username=admin&password=Summer2026!
⚙️ Server-side query (leaked via fuzzing error)
SELECT id, role FROM users
  WHERE username = '$user' AND password = '$pass';
⚠️ HTTP 500 response — single-quote in username
You have an error in your SQL syntax; check the manual that
corresponds to your MySQL server version near ''admin''' at line 1
  • A ARP spoofing
  • B DNS cache poisoning
  • C SQL injection in the username/password fields
  • D SYN flood attack

Right answer (C): That's correct! The verbose SQL error on a single quote and the recovered concatenated query are the classic indicators of SQL injection. A payload like admin' OR '1'='1'-- in the username field will bypass authentication because the back end does not parameterize the query.

Wrong answers:

  • A): ARP spoofing is a Layer 2 network attack that redirects local traffic and has no direct effect on web application login forms.
  • B): DNS cache poisoning redirects users to malicious servers but does not bypass authentication on the legitimate application.
  • D): A SYN flood is a denial-of-service attack that overwhelms a server and would not help in testing login security.

7. The network diagram shown below illustrates that the attacker has a Meterpreter session on the dual-homed DMZ web server "web01" but cannot route directly to 10.0.0.0/24 because only ports 80/443 are inbound through the edge firewall. The tester wants to run Nmap and exploit modules from their own Kali box against DC01, FILE01, and HRAPP. Which technique BEST achieves this pivot?

🌐 Network Topology — Pivot Scenario
ATTACKER Kali Linux 203.0.113.7 Internet EDGE FIREWALL 80/443 only inbound ✖ no direct route web01 (DMZ) COMPROMISED Meterpreter SYSTEM eth0: 172.16.0.10 (DMZ) eth1: 10.0.0.5 (internal) ✔ PIVOT PATH via autoroute + proxychains Internal LAN 10.0.0.0/24 DC01 10.0.0.10 FILE01 10.0.0.20 HRAPP 10.0.0.30 Blocked direct path Available pivot path Compromised host
  • A Setting up a SOCKS proxy with Metasploit's autoroute and proxychains
  • B Running Wireshark on the web server
  • C Using Nikto to scan internal hosts
  • D Performing a brute-force attack on the web server's SSH

Right answer (A): That's correct! Running run autoroute -s 10.0.0.0/24 in the existing Meterpreter session, then auxiliary/server/socks_proxy, lets the tester wrap external tools with proxychains so that scans against DC01/FILE01/HRAPP are tunneled through web01 — exactly the pivot the diagram requires.

Wrong answers:

  • B): Wireshark only passively captures traffic and does not allow active scanning or exploitation of internal hosts.
  • C): Nikto is a web vulnerability scanner, not a network pivoting tool, and cannot route traffic through a compromised host.
  • D): Brute-forcing SSH on the already-compromised web server is pointless since the tester already has access to it.

8. The Meterpreter session transcript shown below depicts a session running as SYSTEM on a Windows 10 host. The tester has loaded a Kiwi-style extension and is about to run sekurlsa::logonpasswords to dump NTLM hashes and cleartext WDigest credentials from LSASS memory. Which underlying tool provides this functionality?

attacker@kali: ~/engagement — msfconsole
msf6 exploit(multi/handler) > sessions -i 3
[*] Starting interaction with 3...

meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter > sysinfo
Computer        : WIN10-FIN-04
OS              : Windows 10 (10.0 Build 19045)
meterpreter > load kiwi
Loading extension kiwi...Success.
meterpreter > kiwi_cmd sekurlsa::logonpasswords

Authentication Id : 0 ; 845127 (00000000:000ce5b7)
Session           : Interactive from 1
User Name         : jsmith
Domain            : ACME
Logon Server      : DC01
        msv :
         [00000003] Primary
         * Username : jsmith
         * Domain   : ACME
         * NTLM     : 8846f7eaee8fb117ad06bdd830b7586c
         * SHA1     : e3c8d5e2f...
        wdigest :
         * Username : jsmith
         * Password : Summer2026!
  • A Nmap
  • B Burp Suite
  • C Wireshark
  • D Mimikatz

Right answer (D): That's correct! The sekurlsa::logonpasswords command and the "kiwi" Meterpreter extension are signature features of Mimikatz — the industry-standard Windows credential dumper that extracts NTLM hashes, Kerberos tickets, and cached plaintext passwords from LSASS memory.

Wrong answers:

  • A): Nmap is a network scanner used for host discovery and port scanning, not for post-exploitation credential harvesting.
  • B): Burp Suite is a web application proxy for intercepting HTTP/HTTPS traffic, not for local Windows credential extraction.
  • C): Wireshark is a network protocol analyzer that captures packets but cannot access the local SAM database or LSASS memory.

9. The shell transcript shown below depicts a www-data shell on a Linux box. /etc/crontab runs /opt/scripts/cleanup.sh as root every 5 minutes, but ls -la reveals the script has 0777 (world-writable) permissions. The tester plans to overwrite the script with a reverse shell payload and wait for cron to fire. Which class of attack does this misconfiguration enable?

www-data@app-prod: /$ — bash
www-data@app-prod:/$ id
uid=33(www-data) gid=33(www-data) groups=33(www-data)

www-data@app-prod:/$ cat /etc/crontab
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin

# m  h  dom mon dow   user    command
*/5  *  *   *   *    root    /opt/scripts/cleanup.sh
17   *  *   *   *     root    cd / && run-parts --report /etc/cron.hourly

www-data@app-prod:/$ ls -la /opt/scripts/cleanup.sh
-rwxrwxrwx 1 root root 184 Mar 12  2026 /opt/scripts/cleanup.sh

www-data@app-prod:/$ stat /opt/scripts/cleanup.sh | grep Access
Access: (0777/-rwxrwxrwx)  Uid: (    0/    root)   Gid: (    0/    root)
  • A Horizontal privilege escalation
  • B Vertical privilege escalation
  • C Pass-the-hash attack
  • D Man-in-the-middle attack

Right answer (B): That's correct! The transcript shows a 0777 script executed by root via cron, so any user (including www-data, uid=33) can rewrite cleanup.sh and have it run as uid=0 within 5 minutes — a classic vertical privilege escalation from low-priv user to root.

Wrong answers:

  • A): Horizontal privilege escalation moves to another account at the same privilege level, not from user to root.
  • C): Pass-the-hash is a Windows-specific NTLM technique not applicable to this Linux cron job scenario.
  • D): A man-in-the-middle attack intercepts network communications and has nothing to do with local privilege escalation via cron misconfiguration.

10. A PT0-003 deliverable contains the two report sections shown below. Section A is written in business-risk language with dollar figures and is aimed at non-technical leadership; Section B contains CVEs, CVSS scores, exploit modules, and patch KBs aimed at the security team. What are these two sections of a professional penetration test report conventionally called?

📄 Penetration Test Report — Acme Corp (Excerpt) CONFIDENTIAL
📋 Section A — Audience: CEO, CFO, Board of Directors

Overall Risk Rating: HIGH

3 critical findings identified that could allow full domain compromise within 24 hours of initial access.

Estimated cost of remediation: $42,000. Estimated breach cost if unaddressed: $1.2M+ (ransomware scenario).

🔨 Section B — Audience: SOC analysts, sysadmins, developers

Finding #1 — EternalBlue (MS17-010)

CVE: CVE-2017-0144  |  CVSS: 9.3 (Critical)  |  Host: FILESERVER-01 (10.10.50.22)

PoC: msf6 > use exploit/windows/smb/ms17_010_eternalblue

Remediation: Apply KB4013389, disable SMBv1 via Group Policy.

  • A Executive summary and technical findings
  • B Risk register and vulnerability log
  • C Scope document and remediation plan
  • D Threat model and attack tree

Right answer (A): That's correct! Section A is the executive summary (business risk, dollar impact, leadership audience) and Section B is the technical findings section (CVEs, CVSS, PoC modules, KBs). Pairing both is the PT0-003 standard for a professional report.

Wrong answers:

  • B): A risk register is an ongoing risk management document, not a standard section of a penetration test report.
  • C): The scope document is created before the engagement during planning, not as a report deliverable after testing.
  • D): Threat models and attack trees are analysis tools representing a specific methodology, not the standard report structure.

Quiz Complete!

0/10

Here's how you performed across PenTest+ domains:

0/2Planning
0/2Recon
0/3Attacks
0/2Post-Exploit
0/1Reporting

Pass CompTIA PenTest+ on your first attempt!!

Just $10/month

Get 75+ full-length practice questions, hands-on labs, and PBQs.

Start Practicing Now

PenTest+ Domain Weights (PT0-003)

Engagement Management17%
Reconnaissance & Enumeration17%
Attacks & Exploits34%
Post-Exploitation & Lateral Movement18%
Reporting & Communication14%

Pass CompTIA PenTest+ on Your First Attempt!!

Get complete practice with 75+ questions, hands-on PBQ simulations, virtual labs, and detailed domain breakdowns. An investment worth making!

Just $10/month
Get Full Practice Exams

Free PenTest+ Flashcards

1 / 5

What is the difference between black box, white box, and gray box penetration testing?

Click to flip

Black box: no prior knowledge (simulates external attacker). White box: full knowledge including source code, architecture, and credentials. Gray box: partial knowledge such as user credentials or network diagrams. Most real engagements are gray box.

Frequently Asked Questions

They serve different purposes. PenTest+ is a knowledge-based certification that validates broad pen-testing methodology and is DoD 8570/8140 approved. OSCP is fully hands-on and more respected in technical pentesting circles. Many practitioners hold both for compliance and practical credibility.

The PenTest+ (PT0-003) passing score is 750 on a 100 to 900 scale. The exam includes up to 85 questions mixing multiple-choice and performance-based questions with a 165-minute time limit.

CompTIA recommends holding Network+ and Security+ before attempting PenTest+, plus 3 to 4 years of hands-on information security experience. Familiarity with Linux command line, basic scripting in Python and Bash, and common exploitation frameworks like Metasploit is very helpful.

The CompTIA PenTest+ (PT0-003) exam voucher costs approximately $404 USD. CompTIA often offers bundle discounts that include a retake voucher. Third-party training providers and academic institutions may offer discounted vouchers as well.

PT0-003 covers five domains: Engagement Management (17%), Reconnaissance and Enumeration (17%), Attacks and Exploits (34%), Post-Exploitation and Lateral Movement (18%), and Reporting and Communication (14%). The Attacks and Exploits domain carries the most weight by far.

Yes. PenTest+ includes PBQs that simulate real-world scenarios such as analyzing tool output, interpreting scan results, writing exploit code snippets, and completing penetration testing tasks in a simulated environment. These appear at the beginning of the exam.

PenTest+ is valid for three years from the date you pass the exam. You can renew through CompTIA's Continuing Education (CE) program by earning 60 CEUs during the three-year cycle, or by passing a higher-level CompTIA certification.

Key tools include Nmap for scanning, Metasploit for exploitation, Burp Suite for web app testing, Wireshark for traffic analysis, Hashcat and John the Ripper for password cracking, Mimikatz for credential dumping, Gobuster for directory enumeration, and SQLmap for SQL injection automation.

Yes, there are no mandatory prerequisites for PenTest+. However, CompTIA strongly recommends having Security+ level knowledge and 3 to 4 years of experience. Jumping straight to PenTest+ without foundational knowledge will make the exam significantly harder.

PenTest+ qualifies you for roles such as penetration tester, vulnerability analyst, security consultant, red team operator, and security engineer. It meets DoD 8140 requirements for certain DCWF work roles, making it valuable for government and defense contractor positions.

PenTest+ is generally considered more hands-on and practical than CEH, which is more knowledge-based and theoretical. PenTest+ includes PBQs and focuses on methodology, while CEH covers a broader range of topics at a higher level. PenTest+ is also significantly less expensive than CEH.

CertLabz offers full-length PenTest+ practice exams with 75+ questions, hands-on virtual labs simulating real penetration testing environments, performance-based question practice, detailed domain breakdowns with progress tracking, and flashcards for key concepts. Plans start at just $10 per month.

Related Articles

Start Free Trial See Pricing Free Certificates