Which of the following areas can be exploited in a penetration test?

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?

Each correct answer represents a complete solution. Choose all that apply.

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?

Each correct answer represents a complete solution. Choose all that apply.

A.
Social engineering

B.
File and directory permissions

C.
Buffer overflows

D.
Kernel flaws

E.
Race conditions

F.
Information system architectures

G.
Trojan horses



Leave a Reply 0

Your email address will not be published. Required fields are marked *