All Practice Exams

200+ Free PenTest+ Practice Questions

Pass your CompTIA PenTest+ (PT0-003) exam on the first try — instant access, no signup required.

✓ No registration✓ No credit card✓ No hidden fees✓ Start practicing immediately
~65-70% Pass Rate
200+ Questions
100% Free

Choose Your Practice Session

Select how many questions you want to practice

Questions by Category

Pentest-Attacks-Exploits70 questions
Pentest-Reconnaissance41 questions
Pentest-Vulnerability-Discovery36 questions
Pentest-Engagement-Management27 questions
Pentest-Post-Exploitation26 questions
2026 Statistics

Key Facts: PenTest+ Exam

~65-70%

Est. Pass Rate

Industry estimate

750/900

Passing Score

CompTIA

$104,000

Avg Salary

CompTIA 2024

DoD 8570

Approved

CSSP Technical

$404

Exam Fee

CompTIA

165 min

Exam Duration

CompTIA

CompTIA PenTest+ (PT0-003) is an intermediate-level penetration testing certification launched December 2024. The exam has up to 90 questions in 165 minutes, requiring 750/900 to pass. PenTest+ covers engagement management (13%), reconnaissance (21%), vulnerability discovery (17%), attacks and exploits (35%), and post-exploitation (14%). It is DoD 8570 approved for CSSP Technical roles.

About the PenTest+ Exam

The CompTIA PenTest+ (PT0-003) certification validates intermediate-level penetration testing and vulnerability assessment skills. It covers planning and scoping, information gathering, vulnerability discovery, exploitation, and post-exploitation activities. PenTest+ is the only penetration testing exam that includes both hands-on performance-based questions and multiple-choice questions.

Questions

90 scored questions

Time Limit

165 minutes

Passing Score

750/900

Exam Fee

$404 (CompTIA)

PenTest+ Exam Content Outline

13%

Engagement Management

Penetration testing planning, scoping, legal considerations, compliance requirements, rules of engagement, contracts, communication, and reporting

21%

Reconnaissance and Enumeration

Passive reconnaissance, OSINT, active scanning, network mapping, service enumeration, DNS/SNMP/SMTP enumeration, host discovery

17%

Vulnerability Discovery and Analysis

Vulnerability scanning, validation, prioritization, CVSS scoring, false positive analysis, credential harvesting, configuration weaknesses

35%

Attacks and Exploits

Network attacks, web application attacks (SQLi, XSS, CSRF), API attacks, wireless attacks, cloud attacks, social engineering, physical security, AI/ML attacks

14%

Post-Exploitation and Lateral Movement

Persistence techniques, privilege escalation, lateral movement, pivoting, data exfiltration, evidence collection, cleanup and restoration

How to Pass the PenTest+ Exam

What You Need to Know

  • Passing score: 750/900
  • Exam length: 90 questions
  • Time limit: 165 minutes
  • Exam fee: $404

Keys to Passing

  • Complete 500+ practice questions
  • Score 80%+ consistently before scheduling
  • Focus on highest-weighted sections
  • Use our AI tutor for tough concepts

PenTest+ Study Tips from Top Performers

1Focus on Attacks and Exploits (35%) and Reconnaissance (21%) — together they make up over half the exam
2Build a home lab with virtual machines to practice hands-on exploitation techniques
3Master Nmap scanning techniques: SYN scans, version detection, OS fingerprinting, and NSE scripts
4Practice web application attacks: SQL injection types (union, blind, error-based), XSS (reflected, stored, DOM), CSRF, and command injection
5Understand privilege escalation techniques for both Windows (token manipulation, UAC bypass) and Linux (SUID, sudo abuse, kernel exploits)
6Learn Active Directory attack techniques: Kerberoasting, AS-REP Roasting, Pass-the-Hash, and lateral movement
7Familiarize yourself with CVSS v3.1 scoring for vulnerability prioritization
8Complete 200+ practice questions including performance-based scenarios before scheduling

Frequently Asked Questions

What is the PenTest+ PT0-003 exam format?

The PenTest+ PT0-003 exam has up to 90 questions with a 165-minute time limit. Question types include multiple choice and performance-based questions (PBQs). You need a score of 750 on a scale of 100-900 to pass. The exam fee is $404 USD. PT0-003 launched December 17, 2024 and PT0-002 retired June 17, 2025.

What are the prerequisites for PenTest+?

CompTIA recommends 3-4 years of hands-on information security or related experience, along with Network+ and Security+ or equivalent knowledge. However, many candidates with 2-3 years of penetration testing, vulnerability assessment, or red team experience successfully pass with dedicated study. Hands-on lab practice is essential for this exam.

What changed in PT0-003 vs PT0-002?

PT0-003 (released December 2024) includes new content on cloud penetration testing, AI/ML attacks, API security testing, and modern web application vulnerabilities. The exam emphasizes hands-on exploitation skills and includes performance-based questions simulating real penetration testing scenarios. PT0-002 retired on June 17, 2025.

Is PenTest+ DoD approved?

Yes, CompTIA PenTest+ is approved under DoD Directive 8570/8140 for CSSP Technical positions. This makes it valuable for government and defense contractor roles requiring penetration testing and vulnerability assessment expertise.

How long should I study for PenTest+?

Plan for 80-120 hours of study over 8-12 weeks. Focus on Attacks and Exploits (35% of exam) and Reconnaissance (21%). Hands-on lab practice is critical — use platforms like TryHackMe, Hack The Box, or build your own lab. Complete 200+ practice questions and score 80%+ consistently before scheduling.

What jobs does PenTest+ qualify me for?

PenTest+ prepares candidates for roles including Penetration Tester, Vulnerability Assessment Analyst, Security Consultant, Red Team Operator, Ethical Hacker, and Cybersecurity Specialist. Average salaries range from $85,000-$100,000 for entry-level to $130,000-$170,000+ for experienced penetration testers.

What tools should I know for PenTest+?

Key tools tested: Nmap (port scanning, OS fingerprinting), Metasploit (exploitation), Burp Suite (web app testing), Wireshark (packet analysis), Gobuster/Dirb (directory enumeration), SQLMap (SQL injection), BloodHound (Active Directory), Mimikatz (credential dumping), Hashcat/John (password cracking), and common Kali Linux tools.