What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
Is This Answer Correct ? | 3 Yes | 0 No |
How does the HTTP handle state?
What is a security policy?
How the Router will pass messages or packets?How it communicate with the Switches?
What are the properties of universal trojan horses?
What is classful and classless routing?
What is slowloris?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
How does ransomware work?
What a security mean in your sense?
Describe the term intrusion detection in the context of IT- security?
Explain how do we use rsa for both authentication and secrecy?
What are worms?