jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Does anyone know (3/4) to the power of -2?
how many halves are in 35/10?
On a survey, students reported how many minutes it takes them to travel to school. Here are their responses. Find the mean travel time for these students. I
which of the following is not considered a difference between bronze age and neolithic technology
What is the main character in a short story called
what's equivalent to y^9 - y^3
Which technique does Billy Joel use to establish unity between the lines?
Calculate the area of the following figure correct to 2 decimal places if can show or explain work
Simplify (1/81) to the 1/4 power
HELP ASAP For the reaction A(g) → 2B(g), Keq = 4.5 × 105. Which statement is true for the system at equilibrium? a) [A] >> [B] b)Changing the temperat