What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
What is a DNS resource record
What are the different Kinds of Malware?
Why is it important to have a nac solution?
What is the idea behind the Bell-La Padula model?
What are major types of networks and explain
Name components of a firewall system?
what is the difference between firewall and antivirus?
2 Answers IL&FS Infrastructure Leasing Financial Services, Sitel,
Explain how do we use rsa for both authentication and secrecy?
What is stateful inspection firewall?
What is malware?
How the Router will pass messages or packets?How it communicate with the Switches?
Explain abouT Security Life Cycle.