What are the vulnerabilities according to the extended CERT
Taxonomy?



What are the vulnerabilities according to the extended CERT Taxonomy?..

Answer / prabhukumar

Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More Networking Security Interview Questions

How to make a system in Network secure?

3 Answers  


A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?

3 Answers   Wipro,


How does a virtual private network (vpn) work?

0 Answers  


What are the vulnerabilities according to the extended CERT Taxonomy?

1 Answers  


How does the HTTP handle state?

0 Answers  






What is risk in IT-Security?

1 Answers   CTC,


What is secured sucket layer and what is the requirement of its in networking

5 Answers   BPO,


how remove add on from explorer

0 Answers   Genpact,


What is phishing?

4 Answers   Global Logic,


Explain what are digital signatures and smart cards?

0 Answers  


What are the types of LAN cables used? What is a cross cable?

0 Answers  


Why is it important to have a nac solution?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)