jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Fill in the blank in the following sentence with the appropriate noun below. You go and see works of art at/in the.​
Which statement about oceans is incorrect? A Evaporation occurs when water is warmed by the sun. B Most evaporation and precipitation occur over the ocean. C 97
What aspects of living in poverty make it difficult for someone to pull themselves out of poverty? GAME LINK -> http://playspent.org/
Corrine earned $67.25 waiting tables, plus another $45.45 in tips. How much did she earn altogether?
Brainliest to right answer
solve each system by substitutionplease x {– 2y = –2 4x{ – 5y = –23
What is The first stage in cellular respiration, what cycle?
PLS HELP IM TIMED!!!What percent of Québec's residents speak French as their first language?60%70%80%90%​
What is the simplest form of the radical expression? √2+√5/√2-√5
What is the product market? the market in which payments are received for selling products to consumers b. the market in which income is received for supplying