jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

On a piece of paper, graph y<-2/5x+1, then determine which answer choice matches the graph you drew
How many moles of atoms are in 4.00 g of 13c?
The campsite shop sells boxes of Funshine Cereal. The base of each box is a 180 mm x 60 mm rectangle. The shelf where the boxes are displayed is a 65 cm x 35 cm
Marcie bought a 50 foot foll of packing tape. She used two 8 5/6 foot lengths. How much tape is left on the roll?
A 5ft 11-inch women cast a three ft shadow. what is the angle that the sun's rays make with the ground? BEST EXPLAINED ANSWER GETS BRIANLIEST!!
Which of the following is an important theme in Part 2 of the Odyssey? A. Good triumphs over evil B. Separation weakens relationships C. The quest for power nev
Social media spreading awareness about social causes would be a negative risk of media globalization. a. True b. False
Dr. leno is a researcher who wishes to measure children's creativity levels. to do this, he asks children how many imaginary friends they have and considers thi
how is the mass and speed of a particle related to its kinetic energy?
Help me please I really need help