jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

what were the consequences of the War of 1898.
Can somebody please help?? The man sped down the road until a police officer stops them. A sentence diagram. The first horizontal line has words man sped. Below
find the equation of the circle whose center and radius are given center (7,3) radius =7
Jeffreys Company reports depreciation expense of $40,000 for Year 2. Also, equipment costing $240,000 was sold for a $10,000 loss in Year 2. The following selec
Type the correct answer in the box. Spell all words correctly. Which approach provides technical and financial assistance for natural resource management? The _
A man bought certain number of litchesat 20 per Rs 100 and an equal no. of 30 perRs 100. He mixed them and sold them at25per Rs 100. Find hisgain or losspercent
what is cell? explain in your own word. ​
action taken by first continental congress
Two general and connected understandings of privacy have been identified: privacy as a right to be "left alone" within a personal zone of solitude, and privacy
Describe two of the reasons the United States felt compelled to enter World War II.