jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

What kind of situation might create an urgency to leave a building?
During a trip to the grocery store, your friend wants to buy some bottled water. Some brands promote the fact that their product is artesian. Other brands boast
Why might a prospect of moving be both exciting and scary
A balloon of helium gas in Alabama has a volume of 22.4 L at 26°C and a 1.03 ATM how big with a balloon get if is transported to Denver on a sunny day when it i
Jacks carries a green a yellow and a black guitar pick in his pocket he randomly chooses a guitar pick from his pocket before every concert what is the probabil
Please help will give brainllest! Please explain! Ms. Gonzalez goes shopping. The total cost of 6 boxes of cereal is $21.60. There 12 ounces of cereal in each b
Sara had 349 dollars to spend on 9 books. After buying them she had 16 dollars. How much did each book cost?
What is the value of x?
The wizard of oz and war of worlds were both escapist fantasies. How were they alike and different?
Does the song, “war” by Edwin Starr support the Vietnam war?