Which of the following areas can be exploited in a penetration test?

Penetration testing (also called pen testing) is the practice of testing a computer system,
network, or Web application to find vulnerabilities that an attacker could exploit. Which of
the following areas can be exploited in a penetration test? Each correct answer represents a
complete solution. Choose all that apply.

Penetration testing (also called pen testing) is the practice of testing a computer system,
network, or Web application to find vulnerabilities that an attacker could exploit. Which of
the following areas can be exploited in a penetration test? Each correct answer represents a
complete solution. Choose all that apply.

A.
Buffer overflows

B.
Trojan horses

C.
Information system architectures

D.
Kernel flaws

E.
File and directory permissions

F.
Social engineering

G.
Race conditions



Leave a Reply 0

Your email address will not be published. Required fields are marked *