jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Andy has 9 math books and 6 reading books if you wants to distribute them evenly among some bookshelves so that each has the same combination of books with none
If three tangents to a circle form an equilateral triangle, prove that the tangent points form an equilateral triangle inscribed in the circle
Trevor thinks about trying out his friend's diet, but he is concerned after learning that inadequate levels of carbohydrates in the diet _____.
Ken, Justin, and Tiff have read a total of 90 books from the library. Justin read 3 times as many books as Ken and Tiff read 2 times as many as Justin. How many
Who were the main super powers during WW2
what two factors affect variation in egg prices?
A mitosis inhibitor is a medication that is designed to prevent mitosis in certain cells. How could these be helpful in the treatment of tumors?
describe elements of the characteristics, lifestyle and impressions of cowboys
With GPS, a single satellite can be used to calculate latitude and longitude. Please select the best answer from the choices provided T F
Which of the following are greenhouse gases? Select all that apply. Oxygen, carbon dioxide, nitrous oxide, nitrogen