jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

EXPLAIN what is happening below the Earth’s surface that is causing the lithosphere to shape our crust in this way. Thanks for helping
When the northern hemisphere is titled towards the sun, what two seasons will the hemispheres be facing?
Coastal areas that are near warm ocean currents are more likely to experience which of following effects?
equivalent fraction 20 of 100 what's the answer
Which art movement developed to rebel against the unemotional, impersonal, and mechanized elements of the modern world?
what is 9\25 in it simplest form?
how do you convert units in length?
Answer them all/ not cheating just want to check them
which of the following is a fragment? A. the canoe with the blue stripes. B. the rams locked horns, and the tourists watched them from far away. C. the dancer f
What is an assumption historians make when they evaluate a source of information?