jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

how many times does 6 go into 312
How do you say" leave me alone" in Spanish
You are given an aqueous solution of NaCl. The simplest method for the separation of NaCl from the solution is (A) evaporation of the solution to dryness (B) c
How did rationing support the war effort in ww2?
is uncover a base word or roots word. is kingdom a base word or roots word. is valuable a base word or roots word. is beautiful a base word or roots word. is di
The outermost tissue of a tree trunk that is 6 feet in diameter would most likely be (A) epidermis (B) cork (C) cortex (D) phloem (E) xylem
If 2n=14 what Is 8n? I am really bad at algebra and I need to do my homework
What is the smallest multiple of 6 and 10
If 2n=14 what Is 8n? I am really bad at algebra and I need to do my homework
How close to North Korea is Inchon?