jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

The importance of filed water balance
Explain one benefit to a business of using crowd funding as a source of finance
give three factors tha influence self esteem​
Give the number that is 2 less than its own absolute value
Why to you do that this app doesn’t tell me anything
20 points!!!! What is the slope of a line that is perpendicular to the line that passes through the points (9,0) and (3,7)?
please help meeee !!!
so i need a bookbag with lots of lots of lots of room and stylish too
Which of the following is true of a radius of a circle? (1) Radius is the distance from the center to any point on the circle. (2) A circle may have radii with
Anyone read the book seedfolks?? If so... How do the characters or events connect to people or events in our world in seedfolks?