What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer Posted / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
Post New Answer View All Answers
What are the types fo ddos attacks?
Different Bitwin ADSL & DSL ROUTER? How To Configure
What is data loss prevention (dlp)?
Describe a TCP connection sequence
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is meant by port blocking within lan?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is the general data protection regulation (gdpr)?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What are the different types of vpns?
What is shadow it?
What are digital signatures and smart cards?
What is Cross Site Request Forgery and how to defend against it?
What is a DNS resource record