Penetration testing (also called pen testing) is the practice of testing a computer system,
network, or Web application to find vulnerabilities that an attacker could exploit. Which of
the following areas can be exploited in a penetration test? Each correct answer represents a
complete solution. Choose all that apply.
A.
Buffer overflows
B.
Trojan horses
C.
Information system architectures
D.
Kernel flaws
E.
File and directory permissions
F.
Social engineering
G.
Race conditions