jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

The neolithic revolution is most closely associated with....
you have a full cylindrical glass of water that stands 8 inches tall and has a radius of 1.5 inches .if you pour the water into a larger cylindrical glass that
What is the change in number of individuals in a population over time? A. population decrease B. population stability C. population growth D. population resista
what time is 9 hours and 30 minutes before. 4:25
what time is 9 hours and 30 minutes before. 4:25
what is the meaning or definition of fighting-gear??
The diameter of your bicycle wheel is 25 inches. How far will you move in one turn of your wheel?
The Indus, Ganges, and Brahmaputra were important to ancient India because they were
The plans for a shed call for a rectangular floor with a perimeter of 204 ft. The length is two times the width. Find the length and width.
you have a full cylindrical glass of water that stands 8 inches tall and has a radius of 1.5 inches .if you pour the water into a larger cylindrical glass that