Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?
Each correct answer represents a complete solution. Choose all that apply.
A.
Social engineering
B.
File and directory permissions
C.
Buffer overflows
D.
Kernel flaws
E.
Race conditions
F.
Information system architectures
G.
Trojan horses