What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
Is This Answer Correct ? | 3 Yes | 0 No |
How to make a system in Network secure?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
How does a virtual private network (vpn) work?
What are the vulnerabilities according to the extended CERT Taxonomy?
How does the HTTP handle state?
What is risk in IT-Security?
What is secured sucket layer and what is the requirement of its in networking
how remove add on from explorer
What is phishing?
Explain what are digital signatures and smart cards?
What are the types of LAN cables used? What is a cross cable?
Why is it important to have a nac solution?