jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Which sentence is correct? A. The observers up front were asked to set down so that the ones in the back could see. B. The observers up front were asked to sit
Find the slope of 3x-4y-7=0
A group of students observed the following tree while hiking a hilly area. What is the most likely cause for the angel of growth of this tree?
reduce 15/24 what's the answer
which greek god was the god of beauty
how much thermal energy is needed to produce 1 cubic meter of steam
Describe how the characteristics of ocean water near an iceberg change from summer to winter. A. higher salinity and lower density B. lower salinity and higher
Why does the 2010 Affordable Care Act stand as one of the most important domestic policy plans in recent history?
In light of Amendment VI, a 1963 Supreme Court decision in Gideon v. Wainright specified A. the role of courts of civil law. B. a timely trial. C. the definiti
The Ferris wheel at the Puyallup Fair2 has a diameter of about 70 feet and takes 3 minutes to complete a full rotation. Passengers board from a platform 10 feet