What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
why u choose storage domain?
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
Diff bet ripv1 & ripv2?
What is the difference between cybersecurity and information security?
What is site-to-site vpn?
Why is it important to have a nac solution?
What are the 5 aspects of IT-Security?
What is the difference between HTTP and HTTPS where u can use HTTPS
What is stateful inspection firewall?
Difference between bit rate and baud rate.
What is a security mechanism?