(ISC)2(ISC)2
CAP · Question #402
CAP Question #402: Real Exam Question with Answer & Explanation
The correct answer is A: Social engineering. See the full explanation below for the reasoning.
Assessment/Audit of Security and Privacy Controls
Question
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.
Options
- ASocial engineering
- BFile and directory permissions
- CBuffer overflows
- DKernel flaws
- ERace conditions
- FInformation system architectures
- GTrojan horses
Topics
#Penetration Testing#Vulnerability Exploitation#Attack Vectors
Community Discussion
No community discussion yet for this question.