jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

where is crust neither formed or destroyed
What is a reason that these data may be unreliable? It is information that is too old to be considered factual. It was found on the American Cancer Society web
24% of 289= estimate using a rate per 100 to get answer
How do we know that caramelizing sugar is a chemical change?
how many forms of the supreme god are there in the hindu triumvirate
a sentence with the word advance and reasoning
write 2x=y/3-4 in standard form
markup is the best defined as
what is 10% of 400.00
I NEED HELP VERY FAST Zlata Filipovic lived in __________ during the __________. the Netherlands . . . Siege on Sarajevo Bosnia . . . Holocaust the N