jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

what type of hardware enables users to interact with a computer?
Triangle jkl has vertices j(0,0),k(5,0),and l(0,-3).Is traiangle jkl equilateral?
ways alexander the great spread greek ideas
You run a 5k for charity. How many feet do you run?
This force comprises all our best trained and out finest troops including scores of thousands of those who have already measured their quality against the Germa
write an equation for twelve times h equals one hundred and twenty minus thirty-six
65% of 520 garments is what garments
Why are third parties important in a political system?They oppose the strongest party.They participate in the debates.They have the largest number of voters.The
Okay the first step of multiplying 1428 •1829 and you get 12,852 what is the next step must u need to continue? Step by step
Where is found mitochondria?