jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Why did city-states in the Delian League revolt against Athens?
Can someone help me please..
mathematical innovation astronomy medicine literature art & architecture is apart of what civilization
5/12 hour = how many minutes. And 2/3 yard = how many inches
write 7 as a fraction with the 9 in the denominator
What are these closer to 1/2,0,or 1: 5/6 7/13 3/5
Ninety-nine percent of all the matter that can be observed in the universe exists as A. gases. B. plasmas. C. liquids. D. solids.
Paint thinners and dry cleaning solvents are considered sources of air pollution. a. True b. False
The best source of water is soda with caffeine. a. True b. False
Determine the nature of this statement. The story takes place in a steel mill in Pittsburgh. fact opinion