jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Please help thank you
9000000 in standard form
Brainliest for whoever gets this right !!!
airground ride spins its occupants inside a flying saucer-shaped container. If the horizontal circular path the riders follow has an 11 m radius, at how many re
and at the end of the story? Why is his attitude surprising How does the protagonist feel about his job on The Skeleton Key at the beginning
What is 4 square root of 81 to the fifth power in exponential form
How does one do streaks?
Heights of Women. Heights of adult women are distributed normally with a mean of 162 centimeters and a standard deviation of 8 centimeters. Use the Table B.3 Ar
Select the GCF of these numbers. 48 and 60
Which point is not a solution to this graphed inequality? a. (0, 0) b. (-4,-3) c. (1, 5 ) d. (2, 1)