Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the vulnerabilities according to the extended CERT
Taxonomy?

Answer Posted / prabhukumar

Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the types fo ddos attacks?

1049


Different Bitwin ADSL & DSL ROUTER? How To Configure

2966


What is data loss prevention (dlp)?

956


Describe a TCP connection sequence

4427


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

2319


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

950


What is meant by port blocking within lan?

977


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

920


What is the general data protection regulation (gdpr)?

1016


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

943


What are the different types of vpns?

986


What is shadow it?

930


What are digital signatures and smart cards?

992


What is Cross Site Request Forgery and how to defend against it?

994


What is a DNS resource record

1023