jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

A treasury blank may be a 30-year commitment
Explain whether or not the following equation is a quadratic function in vertex form. Y=4(x-2) square root of 2 +6
Probability theory predicts that there is a 43.4% chance of a particular basketball player making 5 free throws in a row. If the basketball player taking 5 free
How do atoms usually combine? A In a way that increases the number of valence electrons. B In a way that makes each atom less stable. C In a way that decreas
What role did the Bible play in Protestant faiths? In the Roman Catholic faith?
Which countries civil war resulted in thousands of people dying of disease and starvation in refugee camps in neighboring countries?
how to assemble a skeleton
Why is it important to have categories of numbers and to know which categories you are dealing with in a given expression?
I need help with number 56!! Thanks!!
can someone please anwser 15 x 20 = 5 x ? = 6 x ? you have to fill in the question marks(?)