jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

What is 5% of 62.........................
What is the value 10 years from now of $200 deposited in an account earning 12% interest?
What is the main thing you have to do on here?
3. What is one example of irony from "The Boys' Ambition"?
Jean Piaget studied how children develop their abilities to think, know, and remember. Together, these abilities are called (A) Maturation (B) Temperament (c) C
True or False: Every acid has to have a carbon in its chemical formula.
1 paragraph about the Chinese Parliament
A package of cereal claims that it can help you lose weight if you eat it every morning. What is the purpose of this claim? A. To make the product safer B. To m
Which of the following quotes best encompasses a central idea of 20 points the study's findings? * A. "Within a very short time both guards and prisoners were s
Can somebody read this passage help me with the answer