jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

does hamilton believe the government's power should be strong or weak?
Between which pair of numbers is the exact product of 379 and 8
A shopper thought shoes marked $40 the sales tax is 8% how much the shopper pay in all
“Talk” by Harold Courlander and George Herzog is an example of what writing style?
At STP, which 2.0-gram sample of matter uniformly fills a 340-milliliter closed container?
What is 1/100 of 605
We're Americans justified in being alarmed when the soviets launched sputnik 1 why
write a fact with the same sum of 7 + 5
What's 16.985 in word form
What would be the process to update a patient's account if she moved and didn't give a forward address and the patient is your friend?