jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

on a test, a student answered 12 questions correctly. this number represents 80% of the total number of questions were on the test?
5- X = 13 What is x?
1 gallon to ounces show work
Describe the different global economies that Europeans participated in or created during the European age of expansion.
Using a job site such as Indeed or Monster, locate three job ads for people in your academic major. In each ad, identify references to writing and communication
Metaphorically, why do you think Cassius is the only conspirator with his hood down?
What was Michelle Obama’s relationship with her mother
kojo is n years old now? how old was he 5 years ago.how old will he be 10 years from now​
Given 1 kg = 2.20 lbs, how many kilograms are in 338 lbs? __kg (3 significant figures)​
5.27 repeating as a mixed number in simplest form