jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

What state threatened to secede in 1833? Why?
Which of the following functional groups defines a carboxylic acid?a) -OHb) =Oc) -PO4d) -COOH
during world war 2 about 1.8% of us soldiers were killed directly in battle this number went down to 0.5% at vietnam war what was this number in the persian gul
What is Colorado state sales tax?
Can rocks be weathered by wind and chemicals in the air
A sudden change in the DNA of a chromosome can usally be passed on to future generations if the change occurs in a -
what is the value of the expression ?
Laura wants to know the volume of her gold ring in cubic centimeters. She gets a rectangular glass with a base 7cm,  by 4.5cm,  and fills the glass 8.8cm  high
Is it illegal to be gay in united states?
Which emperor, despite his reputation as a cruel and barbaric leader, Is also well-known for the large public baths constructed under his rule? A. Caligula B. T