jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

when you write a short story, why might you use a thesaurus to look up synonyms of descriptive words?
investigate why inquiries and serious case reviews are required and how sharing of findings affects practice
_____ describes the time and place in a narrative piece of writing. tone setting character suspense
nicole is 26 years old. Emma is 2 years old in how many years will nicole be triple emmas age?
investigate why inquiries and serious case reviews are required and how sharing of findings affects practice
You should only use your high-beam highlights when you are more than __________ feet behind another vehicle you are following. A. 100 B. 200 C. 300 D. 400
what is the molarity of a solution that contains 9.63 grams of hcl in 1.5 liters of solution
read this sentence: after five years of working the same fast food job, paul overcame his inertia and started applying for better jobs. based on the sentence, w
investigate why inquiries and serious case reviews are required and how sharing of findings affects practice
In many cases the encryption or safeguard on an e-card comes in the form of a __________ on the back.