What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
what is sites, why we use it.
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
What is phishing?
how remove add on from explorer
what purpose we are using the ARP ? what purposes we are using ip config?
What are worms?
Cannot ping host machine(windows xp) from virtual machine(linux)in VMware, but can ping to Vmnet1 from virtual machine(linux) and can also ping from host machine(XP) to virtual mach.(linux), both side firewalls are disabled, networking type=host only.
What is an arp and how does it work?
What is an arp?
What are major types of networks and explain
How do I recover My Hotmail Account without a phone number and email?