Question 45:
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.
Answer options:
A. Social engineering B. File and directory permissions C. Buffer overflows D. Kernel flaws E. Race conditions F. Information system architectures G. Trojan horses