jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

The common phrase “beware of Greeks bearing gifts” has its origins in A. the legend of the goddesses' battle over the golden apple. B. the journey of Odysseus
Flowering plants and shrubs are unable to grow in deciduous temperate rain forests. What is the possible reason for this phenomenon?
What are five essential requirements for creating a government
how protecting land lead to feudalism ?
what is the difference between a colony and a polis
1.a realistic artist who inspired Rubens 2.a three-panel composition 3.a Renaissance artist who inspired Rubens 4.the look of the background of Rape of the D
what are 2 ways a mixture defers from a compound
express 245 as a product of its prime factors
what is japanese feudalism
Compare and contrast a quincha home and a tambo home.