jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

PLEASE HELP MATH QUSTION!!!
what are some possible outcomes if the government does not meet these expectations
"copyright is a legal protection given to creators of certain types of intellectual property" select one: a. True b. False
How does the cerebral arterial circle ensure that the brain has a constant supply of blood?
What number is between 2 and 7 is less than 100 but larger than 50 the product of three different prime numbers?
What is the difference between the RAM and ROM
Do lobbyists exert influence among all three branches of government? Why or why not?
What mechanism of development underlies the main differences between a novice driver and an experienced driver?
What is the equation of a line perpendicular to the line y=(4/9)x-2 that passes through the point (4,3)?a. y= -(4/9)x-2b. y= (9/4)x+6c. y= -(9/4)x+12d. y= -(9/4
The Sugar Sweet Company is going to transport its sugar to market. It will cost $5625 to rent trucks, and it will cost an additional $225 for each ton of sugar