answersLogoWhite

0

i want the answer not answering my own questions . you filthy

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

A vulnerability of web based application?

what a vulnerability of web based application


what mean vulnerability of web based application?

If the application is succeptible to internet attacks


What is a vulnerability of ActiveX?

ActiveX controls can modify the properties of objects in an application.


What is a vulnerability of Active X?

Active X controls can modify the properties of objects in an application. AGNugent


Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps?

Nessus


What risks threats and vulnerability did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?

Risk assessments evaluate the sensitivity and critical of the system or application data to the vulnerabilities, threats, impacts, and potential countermeasures that may exist in its environment.


Application of management principles flow from?

Could be strategic planning process, or maybe vulnerability assessment. Wait no, it's Six Sigma I think . . . not sure are you?


What is a vulnerability scan?

A vulnerability scan is the automated process of proactively identifying vulnerabilities of software and computing systems in a network to determine if and where a system or network can be exploited and/or threatened. Vulnerability scanning usually employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to improve the network's overall security posture. The primary goal of a vulnerability scan is to reduce the vulnerability of a software application, a database, a computer, or a network of computers to hacking, denial of service, infection, and other security risks.


What is defined as a weakness that can be exploited by and adversary?

Vulnerability


Who uses HTML?

Most websites use html along with other webbased languages


What vulnerability did Odysseus have?

His vulnerability, as far as I know, is immortal women.


Where can web ct information be found?

WebCt or Webbased Cource tools require a student to have a long on and password to acccess information. Username and passwords may be obtained from the institution in which you purchased the online class.