CompTIA • PT0-003
CompTIA PenTest+ validates the skills required to plan, scope, and execute penetration testing engagements across network, web, cloud, and AI environments. It covers the full pentest lifecycle from reconnaissance and exploitation through post-exploitation, reporting, and communication of findings.
Questions
699
Duration
165 minutes
Passing Score
750/900
Difficulty
ProfessionalLast Updated
Mar 2026
CompTIA PenTest+ (PT0-003) is a professional-level certification that validates the skills required to plan, scope, and execute penetration testing engagements across diverse environments including networks, web applications, cloud platforms, and AI systems. The certification demonstrates expertise across the full penetration testing lifecycle, from initial reconnaissance and vulnerability discovery through active exploitation, post-exploitation techniques, lateral movement, and comprehensive reporting. The PT0-003 version, launched December 17, 2024, represents the latest iteration of this credential and emphasizes modern attack surfaces and contemporary threat landscapes.
CompTIA PenTest+ is designed for security professionals with 3–4 years of hands-on experience in penetration testing or offensive security roles. Ideal candidates include penetration testers, ethical hackers, security analysts, vulnerability assessment specialists, and security consultants seeking to validate and advance their offensive security expertise. The certification is particularly valuable for professionals working in organizations requiring demonstrated competency in identifying and exploiting system vulnerabilities, as well as those pursuing careers in red team operations, bug bounty programs, or managed security services.
CompTIA recommends that candidates possess a minimum of 3–4 years of practical experience in a penetration testing role. Additionally, candidates should hold CompTIA Network+ and Security+ certifications or demonstrate equivalent knowledge in networking fundamentals, security concepts, and system administration. While formal prerequisites are not strictly enforced, candidates without this background may find the exam challenging, as it assumes proficiency with networking protocols, cryptography, operating systems, and security frameworks. Hands-on experience with penetration testing tools, vulnerability assessment platforms, and exploitation techniques is essential preparation.
The PT0-003 exam consists of a maximum of 90 questions combining multiple-choice and performance-based question types. The exam duration is 165 minutes (2 hours and 45 minutes), allowing approximately 1.8 minutes per question on average. The exam is delivered online through Pearson VUE testing centers worldwide and is available in English, French, Japanese, and Portuguese. Scoring is on a scale of 100–900, with a passing score of 750. The exam includes unscored pretest questions used for item analysis and future exam development. The previous version (PT0-002) retires on June 17, 2025, with PT0-003 estimated to remain current until approximately 2027.
Holding the CompTIA PenTest+ certification significantly enhances career prospects in the cybersecurity field. Penetration testers with this credential command competitive salaries, with median annual earnings around $110,540–$131,970 in the United States, representing 75–175% above the median national wage. The credential is increasingly featured in job postings across the industry and validates expertise required for roles such as Penetration Tester, Security Analyst, Red Team Specialist, and Vulnerability Assessment Specialist. The Bureau of Labor Statistics projects 32% growth in information security analyst positions through 2032, while the U.S. penetration testing market is expected to triple by 2028, indicating strong demand for certified professionals. PenTest+ has gained rapid adoption among employers and is recognized as a credible validation of offensive security skills, particularly in organizations requiring demonstrated competency in vulnerability identification and remediation. The certification positions holders for advancement into senior security roles, management positions, and specialized careers in bug bounty programs and managed security services.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 699 questions.
1. During an internal penetration test, you are using CrackMapExec to perform lateral movement. You have obtained both plaintext passwords and NTLM hashes. Which command syntax correctly demonstrates Pass-the-Hash authentication? (Select one!)
Explanation
CrackMapExec uses the -H flag (uppercase H) to specify NTLM hashes for Pass-the-Hash attacks, while -p (lowercase p) is used for plaintext passwords. The hash format is LM:NTLM, though the LM portion is often the empty LM hash (aad3b435b51404eeaad3b435b51404ee). Using -p with a hash or a non-existent --ntlm flag would not work correctly. This distinction is critical for proper tool usage during lateral movement operations.
2. A penetration tester is comparing password attack techniques for an engagement where minimal detection is required. Which attack technique has the LOWEST detectability because it avoids account lockout policies? (Select one!)
Explanation
Password spraying has the lowest detectability because it uses a very small number of common passwords (typically one or two) across many different accounts. This approach stays below account lockout thresholds and generates failed login attempts spread across the user population, mimicking normal failed login activity. Brute force and dictionary attacks generate high volumes of failures per account and trigger lockouts quickly.
3. During the vulnerability analysis phase for Northwind Traders, the security team needs to determine which tool is appropriate for identifying vulnerabilities in third-party open-source libraries included in the application's dependencies. Which testing approach is MOST appropriate? (Select one!)
Explanation
Software Composition Analysis (SCA) is specifically designed for identifying security vulnerabilities in third-party open-source libraries and dependencies. Tools like Snyk and OWASP Dependency-Check compare declared dependencies against known CVE databases and can generate a Software Bill of Materials (SBOM) documenting all components. This addresses supply chain risk. SAST analyzes proprietary source code for coding flaws but doesn't specifically manage third-party dependency vulnerabilities. DAST tests running applications from an external perspective and cannot identify which library versions have CVEs — it only observes exploitable runtime behavior. IAST instruments the runtime to detect code-level issues but focuses on application behavior rather than dependency version management.
4. A penetration tester at Fabrikam Corp has compromised a Windows domain controller and wants to perform lateral movement to a specific file server without contacting the Domain Controller again. The tester has obtained the service account hash for the file server's CIFS service. Which attack allows service ticket forgery without Domain Controller contact? (Select one!)
Explanation
A Silver Ticket attack uses a service account hash to forge a Kerberos service ticket (TGS) for a specific service, which is validated locally by the target service without contacting the Domain Controller. This makes Silver Tickets much harder to detect and requires no DC communication after the ticket is created. A Golden Ticket requires KRBTGT hash and does contact the DC for subsequent TGS requests. Pass-the-Hash uses NTLM authentication, not forged Kerberos tickets. Kerberoasting extracts service ticket hashes for offline cracking rather than forging tickets.
5. Fabrikam is implementing infrastructure-as-code for their AWS environment using Terraform and Kubernetes manifests. The security team needs to scan these configuration files for misconfigurations, hardcoded secrets, and compliance violations BEFORE deployment to production. Which tools should be integrated into the CI/CD pipeline? (Select three!)
Multiple correct answersExplanation
IaC (Infrastructure as Code) scanning analyzes configuration files BEFORE deployment to prevent security issues from reaching production. Checkov is an open-source tool supporting Terraform, CloudFormation, Kubernetes, Dockerfile, and more with 1000+ built-in policies. Trivy scans IaC templates, container images, and filesystems for vulnerabilities and misconfigurations, serving as a successor to tfsec. KICS by Checkmarx analyzes Terraform, CloudFormation, Kubernetes, Ansible, and Helm with approximately 2000 queries and is GitLab's default IaC scanner. Burp Suite is a DAST tool for running web applications, not static file analysis. Nikto performs web server scanning, not IaC configuration analysis. Metasploit is an exploitation framework, not a static analysis tool.
One-time access to this exam