jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

find the quotient for 62 divided by 338
Rachel jogged along a trail that was 1/4 of a mile long. she jogged along the trial 8 times. How many miles did Rachel jog in all?
Reasonableness Is the product of 6×2×4 less than 50? Explain
How did Russia become a communist country? A. Russia fought in the Great War, and the Treaty of Versailles made Russia a communist country. B. During the World
What is 12 is 2% of what unknown value?
The sales tax on a $350 computer is $22.75. Find the tax rate.
Given that Islam is one of the major world religions, identify FOUR ways in which Islam has spread to other parts of the world.
At a restaurant after every 12th visit you receive a free drink. After every 15th visit you receive a free dessert. At which visit will you first receive a free
what indian tribes inhabited Delaware.
Which type of anatomic structure are bird wings and butterfly wings when compared to each other?