jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

The NRF guiding principles include engaged partnership, tiered response, unity of effort and readiness to act, and A Whole Community B. Environmental Response/H
Who made Coca Cola and with what?
How is race relations related to hard won liberty?
The dimension of a room has 5.31m by 7.6m. Find the limits of accuracy for the area of the room​
Tammy has $20 to spend at the movie theater. She spends $9.50 on a movie ticket. If the snack counter sells bags of candy for $3.50 each, how many bags of candy
An organism which causes a disease A.host B. Vector C. Parasite D. Pathogen
He let me eat a mamango (into passive)​
If a test has 40 questions and you get 200 points for the whole test, how many points are each question worth?
Explains how to find n, the number of copies the machine can make in one minute and How long will it take the machine to print 5,200 copies
why did progressive reforms, gender role chnages, unequal economic gains and a seeming cultural permissiveness produce resistance?