What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
What is BSOD?
What are the methods of defense (in context to IT-Security)?
Different Bitwin ADSL & DSL ROUTER? How To Configure
What is trojan virus?
Explain the difference between discretionary access control and mandatory access control?
What is an information security management system (isms)?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
how secure is SAP applications?
What is secured sucket layer and what is the requirement of its in networking
What is subnet
What is the role of single sign on in authentication technologies?
what are the different types of datasets related to the network intrusion detection system?