jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

After his paycheck, Mr.Weber's credit card balance was $245.76. His payment was for $75.00. Write and solve an equation to find the amount of his credit card
what is 140/216 in simplest forms
If a 21 ounce box of cereal costa $2.94,what is the unit price.
How to make a mixed fraction
determine a relationship between the x- and y- values. write an equation. x =1 2 3 4 y = 4 5 6 7
Cheryl has some oranges. She puts the oranges into p boxes of 3 oranges each and has 2 oranges left. Find the total number of oranges Cheryl has in terms of
what is the difference between concealed and revealed propaganda
find the slope of the line described by x - 3y =-6.
which is an example of an intentional injury
if hares with long legs run faster than hares with short legs, which hares do you expect would be most likely to survive and reproduce