List of questions
Related questions
Question 45 - CAP discussion
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.
A.
Social engineering
B.
File and directory permissions
C.
Buffer overflows
D.
Kernel flaws
E.
Race conditions
F.
Information system architectures
G.
Trojan horses
Your answer:
0 comments
Sorted by
Leave a comment first