jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Asking again cause last time i got spam answers
In the food web above, which of the following organisms is a prey organism? A. Raccoon B. Mosquito C. Clover D. Worm
EVERYONE BE SAFE THERE ARE HACKERS HERE WHO ARE SENDING LINKS THE WHEN THEY SEND THEN SEND AND YOU COPY AND PASTE IT ON IT THEY ARE IMMEDIATELY TRACKING YOUR IP
identify two events that occurred in freedom writers
como terminar el quinto verso en el poema uno no escoge
HELP ME PLEASEEEEEEEEEE
indicate any recent songs that you think are controversial and explain why that particular song is viewed as being controversial
Which number line shows the solution to the inequality n > 4?
What the answer to 7+8=
2c - 3b when C = 8 and b = 3.5