jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

a mother places her hand on a hot stovetop. The stimulus reaches the sensory neaurons of her fingertips. What nerve pathway will this stumulus signal contunue t
The amendments designed to secure the liberties of citizens and to prevent government from taking away these liberties are known as the Articles. the Declaratio
Select three events from the list of five given below - one showing isolationism, one showing intervention, and one showing imperialism . Using complete sentenc
When making a guess, you are forming a_______. Can you help me complete this sentence??!?!!?
What did Bud learn about Herman E. Calloway from Miss Thomas? ---Bud, Not Buddy
Isotopes of uranium are the most common fuel used in nuclear power plants. True/ False
What temperature is 23 degrees above freezing in fahrenheit
0.2(x+50)-6=0.4(3x+20)
What is 5/12 divided by 3/16 as a fraction?
why did british colonies in the south have the greatest number of slaves