Question 154:
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.
Answer options:
A. Race conditions B. Social engineering C. Information system architectures D. Buffer overflows E. Kernel flaws F. Trojan horses G. File and directory permissions