jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Describe and name what the form of dna is in the nucleus during interphase.
How did roosevelt's views about the role of government differ from presidents of the 1920s?
Who was the 12th president of the United States?
how did the role of colonialism in spreading christianity around the world
Help please ppl Guys
Write an expression for the following situation and solve. Mr. Simms bought 20 pencils. He used 1/4 of the pencils and then gave 4 to his students. How many tot
Someone relying on convergent thinking would answer _____ to the query "what can you do with a toothbrush?"
Darnell underwent surgery to control his severe epilepsy. now, however, darnell cannot form new memories of his experiences, although he does remember events in
what is the translation?
Hint: Omars equation doesn't work! Identify his error and correct it by showing the steps Omar should have taken and determine the correct value of x.