What are the vulnerabilities according to the extended CERT
Taxonomy?
Answer / prabhukumar
Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors
| Is This Answer Correct ? | 3 Yes | 0 No |
How I recover my windows 7 password? ps: When I try to log on my computer as common, the screen display the error"the user or password is incorrect"
what is the difference between firewall and antivirus?
2 Answers IL&FS Infrastructure Leasing Financial Services, Sitel,
What is the sense of a fingerprint?
What is IPCONFIG command? Why it is used?
What is 3 DES 256 bit security in IPSec technology.
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
0 Answers Excel, RT Outsourcing,
Why should you care about the OSI Reference Model
What is terminal emulation, in which layer it comes
What protects and describes the Chinese Wall model?
Explain difference between broadcast domain and collision domain?
What is ospf protocol
What are the types of Transmission media