jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Please help me! Asap
Can someone please help quick
Which is a reason writers use rhythm in poetry
what is the connection between tissue fluid,plasma and lymph?
A chef is going to use a mixture of two brands of italian dressing. the first brand contains 9% vinegar, and the second brand contains 14% vinegar. the chef wan
Who is the founder of the phone?
"si no____ dormir y el sue?o deseas, lo vas a conseguir si ____ovejas (sheep)."
Inside the lungs are sac-like objects called ______.
Article I, Section 9 states, among other things, that Congress may establish the rules of naturalization.trueorfalse
In which part of the scientific method would you make a prediction?