jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

What are "the darling buds of may" in line 3 of Sonnet 18?
A computer technician charges $40.00 per hour plus a $65.00 service charge. Your father's firm hires him to hook up his company's Internet service.
How does the author develop the narrator's initialmotivation to buy a car?a- The narrator states that everyone he knew alreadyowned one.b- The children of the n
what is an agent that can cause infections and diseases
How did Nazi rule affect the lives of German people? Check all that apply. Boys were prepared for military service, Students were taught only Nazi ideology. Stu
3.) this graph shows the rates of reaction in a chemical reaction with and without the addition of an enzyme ¤Explain the shape of each line What is happening t
Find the product please i need it ?
what new wepon helped the end of world war 2​
typically a food chain has five or fewer links because
Verb tense convey time, sequence, condition or state. We walk through the forest in search of koalas