What are the vulnerabilities according to the extended CERT
Taxonomy?

Answer Posted / prabhukumar

Boundary Condition Errors,Input validation Errors,Access
Validation Errors,Synchronization Errors,Synchronization
Errors,Environment Errors

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is difference between discretionary access control and mandatory access control?

559


What is the difference between cybersecurity and information security?

610


Explain abouT Security Life Cycle.

600


Explain what does cia stand for in security management?

551


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

502






How long can a ddos attack last?

661


What a security mean in your sense?

617


What does cia stand for in security management?

547


What is information security?

585


What is remote access vpn?

572


What is trojan virus?

576


What is the difference between a virus and malware?

520


How to you keep yourself updated on network security ?

563


What are the different aspects of shadow it?

544


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

485