jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

3/7 of what number is 9? How am I suppose to figure this out?
Find the difference. 7 7/8 - 3 1/4 ?
What is the difference between evidence and inference?
what is a type of science that studies Earth and space
How much is this shaded Please help
A company used about 7.4 × 105 sheets of paper in a month. Of the paper used during the month, the accounting department used about 8.9 × 103 of the sheets. Abo
What is the position of 7 in the number 876,543?
What are the next three numbers in this pattern? 6,000 6,003 6,009 6,018 6,030 6,045 ... .. ...
Can some one help me with this Please help
In the late 20th century , the green revolution had the greatest impact on