jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

The Great Lakes region has both biotic and abiotic components. Abiotic components include water, temperature, rainfall, and geological features. Biotic compone
How does a republic differ from the colonial form of government experience before the American revolution?
#7 plz help me!! Need to finish before tmmrw. THANK YOU SOOOO MUCH
How is 2 ones the same as 20 tenths?
A clock can make 1 full rotation with its hand in 1 minute. How many rotations would it make in 1 hour?
Is it ok to drink a beer after 5 hrs after taking a flexeril?
The sum of the perimeter of the rectangles is 40cm. The sum of their area is 46 cm^2. Find the values of x and y.Could you explain how to do the calculation?
1×12 2×11what is itor
a ball is dropped from a height of 10 meter each time it bounces, it reaches 50 percent of its previous height. the total vertical distance the ball has travel
What is the equation of the line in slope -intercept from that is perpendicular to the line y=3/4x-2 and passes through the point (-12,10) ?