jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

does lily plant carry out photosynthesis
Find an equation for the line below.
Find an equation of the tangent line to the curve at the given point. y = 7x + 9 cos(x), p = (0, 9)
if 14xz - 21yz = az(2x -by), where a and b are positive real numbers, what is the value of a+b?
What was the impact of King Philip’s War (1675–1676)? A. Whites in New England experienced a broadening of freedom in the long run. B. Native Americans up an
Need help! Please show how you got it and explain if possible.
A force of 100 N acts uphill on a 4 kg mass which sits on a surface with μ = 0.7 inclined at 23 degrees. Find the acceleration.
Geometry math question
Answer questions 222 and 223.
find the measure of the third angle of a triangle given that the first two angels are 44 degrees and 72 degrees