What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
how to block a website in xp
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
IS IC AND MICROPROCESSOR ARE SAME?
How to implement PIX firewall security?
How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
What are the different types of vpns?
What is remote access vpn?
Name firewall architectures?
Different Bitwin ADSL & DSL ROUTER? How To Configure
What is difference between baseband and broadband transmission
What is multicasting?
What is Cross Site Request Forgery and how to defend against it?