jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

One of the key disadvantages of buying fitness equipment is __________. A. privacy B. flexibility C. maintenance D. choice
Financial experts advise you will need approximately how much of your pre-retirement income in order to maintain your standard of living after you retire?
Why did farmers in the late 1800s want inflation?
How many parts of a business letter are indented in block format? one three none four
30 POINTS! I NEED HELP
You own a portfolio of two stocks, a and b. stock a is valued at $2,000 and has an expected return of 10.5 percent. stock b has an expected return of 14.7 perce
Which triangle always has only two sides the same length and one angle that measures 90°? A. acute scalene B. right isosceles C. obtuse scalene D.
A landscaper used 35% of the total amount of mulch he had on his truck for a job. If he used 42 pounds of mulch for the job, how many pounds of mulch did the la
what are the two factors that causes the cycle of the seasons
Write the equation that shows the ionization of CHI bass in water