jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Isotopes of an element must have different (1) atomic numbers (2) mass numbers (3) numbers of protons (4) numbers of electrons
Atoms of which element can bond to each other to form chains, rings, and networks? (1) carbon (3) hydrogen (2) fluorine (4) oxygen
Which ancient Chinese philosophy started first?
A nuclear fission reaction and a nuclear fusion reaction are similar because both reactions (1) form heavy nuclides from light nuclides (2) form light nuclides
In the book 1984, what happens to the historical documents that Winston must change?
The region that is the most probable location of an electron in an atom is (1) the nucleus (3) the excited state(2) an orbital (4) an ion
In the ground state, which atom has a completely filled valence electron shell?(1) C (2) V (3) Ne (4)Sb
What can be concluded if an ion of an element is smaller than an atom of the same element? (1) The ion is negatively charged because it has fewer electrons than
29.10 rounded to the nearest tenth
Which product of nuclear decay has mass but no charge? (1) alpha particles (3) gamma rays(2) neutrons (4) beta positrons