answersLogoWhite

0


Best Answer

i want the answer not answering my own questions . you filthy

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: A vulnerability of web-based application
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A vulnerability of web based application?

what a vulnerability of web based application


what mean vulnerability of web based application?

If the application is succeptible to internet attacks


What is a vulnerability of ActiveX?

ActiveX controls can modify the properties of objects in an application.


Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps?

Nessus


What is a vulnerability of Active X?

Active X controls can modify the properties of objects in an application. AGNugent


What risks threats and vulnerability did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?

Risk assessments evaluate the sensitivity and critical of the system or application data to the vulnerabilities, threats, impacts, and potential countermeasures that may exist in its environment.


Application of management principles flow from?

Could be strategic planning process, or maybe vulnerability assessment. Wait no, it's Six Sigma I think . . . not sure are you?


What is defined as a weakness that can be exploited by and adversary?

Vulnerability


What is a vulnerability scan?

A vulnerability scan is the automated process of proactively identifying vulnerabilities of software and computing systems in a network to determine if and where a system or network can be exploited and/or threatened. Vulnerability scanning usually employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to improve the network's overall security posture. The primary goal of a vulnerability scan is to reduce the vulnerability of a software application, a database, a computer, or a network of computers to hacking, denial of service, infection, and other security risks.


What is the differecne between penetration testing and vulnerability testing?

Vulnerability testing identifies available vulnerabilities and is usually used to only manage list of available vulnerabilities. Penetration testing includes phase of Vulnerability testing but goes beyond. The tester actively tries to exploit identified vulnerabilities to gain access to the system. Penetration testing identifies the true risk level of tested system and application.


What vulnerability did Odysseus have?

His vulnerability, as far as I know, is immortal women.


What is the so what factor of risk assesment in the OPSEC process?

vulnerability