What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer Posted / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
How to implement PIX firewall security?
What is stateful inspection firewall?
Explain what is the role of single sign on in authentication technologies?
How does dlp work?
Why do we use virtual private network?
What do you do when you get blue screen in a computer? How do you troubleshoot it?
What is RIS?
What is a ddos attack?
Describe a TCP connection sequence
Explain the difference between broadcast domain and collision domain?
Explain how do we use rsa for both authentication and secrecy?
What are major types of networks and explain
What is an arp?
What is slowloris?
What is proxy firewall?