ExamGecko
Home Home / ISC / CAP
Question list
Search
Search

List of questions

Search

Related questions











Question 45 - CAP discussion

Report
Export

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

A.
Social engineering
Answers
A.
Social engineering
B.
File and directory permissions
Answers
B.
File and directory permissions
C.
Buffer overflows
Answers
C.
Buffer overflows
D.
Kernel flaws
Answers
D.
Kernel flaws
E.
Race conditions
Answers
E.
Race conditions
F.
Information system architectures
Answers
F.
Information system architectures
G.
Trojan horses
Answers
G.
Trojan horses
Suggested answer: A, B, C, D, E, G
asked 18/09/2024
Amil Akhundzada
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first