ExamGecko
Home Home / ISC / CAP
Question list
Search
Search

List of questions

Search

Related questions











Question 154 - CAP discussion

Report
Export

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

A.
Race conditions
Answers
A.
Race conditions
B.
Social engineering
Answers
B.
Social engineering
C.
Information system architectures
Answers
C.
Information system architectures
D.
Buffer overflows
Answers
D.
Buffer overflows
E.
Kernel flaws
Answers
E.
Kernel flaws
F.
Trojan horses
Answers
F.
Trojan horses
G.
File and directory permissions
Answers
G.
File and directory permissions
Suggested answer: A, B, D, E, F, G
asked 18/09/2024
Everardo Gonzalez
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first