What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
What are major types of networks and explain
What are the types of phishing attacks?
What is dss?
What is cloud security?
Name firewall architectures?
Why LDAP is called light weight?
10 Answers PC Solutions, Symantec, Veritas,
How do we do authentication with message digest(md5)?
Explain for a small lan which class of addressing is used?
What protocol is used by DNS name servers
What are the types of Transmission media
What is proxy firewall?
what is active directory partication ?