(ISC)2(ISC)2
CGRC · Question #579
CGRC Question #579: Real Exam Question with Answer & Explanation
Sign in or unlock CGRC to reveal the answer and full explanation for question #579. The question stem and answer options stay visible for context.
Assessment/Audit of Security and Privacy Controls
Question
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply. Response:
Options
- ARace conditions
- BSocial engineering
- CInformation system architectures
- DBuffer overflows
- EKernel flaws
- FTrojan horses
- GFile and directory permissions
Unlock CGRC to see the answer
You've previewed enough free CGRC questions. Unlock CGRC for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Penetration Testing#Vulnerability Exploitation#Attack Vectors#Social Engineering