jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Current research suggests that the substance _______ is an endogenous ligand for cannabinoid recepto
what is 8.1, 8.16, 8.106, 7.1242 from least to greatest?
Are spirituality and religion the same? Why why not?
Which of these graphs represents a function?
explain why the arts stopped advancing during the Dark Ages.
help on this problem​
5+1/3(9y−12)=5/6(y+18)+1/6y
Jermaine bought a 25-pack of blank CDs for $22.23. What is the price per CD to the nearest cent
what does this quote mean by Ella baker that in order to see where we are going,we not only must remember were we have been,but we must understand where we have
It was a (an) ____ to hear thay someone with his level of experience made such a mistake like that. A) suprise B) shock C) awe D) amazement