jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Becca paddles a boat from the south bank of a stream to the north bank. She paddles at a rate of 8 mph. The stream is flowing west at a rate of 6 mph. Which of
A law passed by a legislative body that makes an individual guilty of a crime without a trial is
Immediately preceding the onset of an eating disorder in a woman, one would most likely find that she:
What best describes characterization? the way a character should be performed how a main character meets his or her downfall how a main character overcomes a tr
John Calvin is BEST known for a.his contributions to the Protestant Reformation. b.his attempts to reform the Catholic Church. c.his exploration of the St. L
Which type of spectroscopy would you most likely use to determine the composition of the moon through a telescope
What’s 10x-6y+3x-7x+9y
Which facts are true for the graph of the function below? Check all that apply F(x)= 2•5^x
Find the center of the circle whose equation is (x - 2)² + (y - 4)² = 9
Why couldn't the two Elephants Go swimming together?