What are the vulnerabilities according to the extended CERT
Taxonomy?



What are the vulnerabilities according to the extended CERT Taxonomy?..

Answer / prabhukumar

Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More Networking Security Interview Questions

How does the HTTP handle state?

0 Answers  


What is a security policy?

1 Answers   Airtel, Techworld,


How the Router will pass messages or packets?How it communicate with the Switches?

1 Answers   Excel,


What are the properties of universal trojan horses?

1 Answers  


What is classful and classless routing?

0 Answers  






What is slowloris?

0 Answers  


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

0 Answers  


How does ransomware work?

0 Answers  


What a security mean in your sense?

0 Answers  


Describe the term intrusion detection in the context of IT- security?

4 Answers  


Explain how do we use rsa for both authentication and secrecy?

0 Answers  


What are worms?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)