jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

The character of dori from the movie finding nemo keeps complaining that she has short-term memory loss because she can't remember the name of the friend she ju
What is one example of a closed economy
Generosity is a value that is important to Allison. This behavior best reflects generosity. A.) Setting a volunteer schedule for the week. B.) Discussing with
why rhizoids not called roots?
why rhizoids not called roots?
10.3 = 0.6y How do I find the answer to this on please
The forest that grows in regions that receive continuous warm temperatures and seasonal rainfall is the ____. a. tropical rain forest b. temperate rain forest
?seventeen-year-old alice drinks alcohol to deal with all the things that are difficult in her life. which approach is most likely to decrease her alcohol use?
If bob produces 36 or fewer in a week, he is paid x dollars per item. if bob produces more than 36 items, he is paid x dollars per item for the first 36 items,
Some bacteria live in the roots of plants like soybeans and peas. What is the role of these bacteria in the nitrogen cycle?a.to absorb nitrogen-containing co