jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

simplify using order of operations(PEMDAS):(2^3x6)-3^2
The energy in fossil fuels is derived from the energy stored in plant and animal matter
How do you figure out the ratio stars to squares when there are 11 squares 5 stars and two circles in the data?
what is the volume of a block with dimensions 2.56cm x 4.652 cm x 8.70 cm ??
why are the seasons  at higher latitudes different from seasons at latitudes near the equator
Among members of George Washington's cabinet, __________ had a pessimistic view of human nature and a dread of democratic excess. A. Marshall B. Jefferson C.
Which sentence contains a misplaced modifier?  A.With loud shouts and screams, the Morenos felt the arena vibrate.  B.Soon, a loud buzzer sounded, and the playe
What does CPU stand for. And it is the _____ of the computer
An average person in the United States throws away 4.5 × 10–1 kg of trash per day. In 2013, there were about 3.2 × 106 people in the U.S.About how many kilogram
How do I solve 394 × n = 3.94