jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Please answer I’ll mark you brainlist!!!
Solve for n: n/12 = 3/4 A. n = 12 B. n = 15 C. n = 18 D. n = 9
Quizizz help pls 10 pts each brainliest guaranteed WITH A PICTURE
how many miles can a trumble car travel around town with a full tank?please help​
Whatcha of the following is an example of a reaction of fear
Milan wants to wallpaper the back wall of his bedroom. The wall is in the shape of a rectangle. Its length is 16 and its width is 8 feet. Suppose wallpaper cost
desire for religious freedom was one reason to
if it is spring in the north.Hemisphere,it is blank in the south.Hemisphere
A leg of a right triangle is 25 meters long, and the hypotenuse is 35 meters long. What is the length of missing leg? 600 meters 24.5 meters 300 meters 30 meter
It is important to maintain the same reading rate when reading an article; avoid speeding up and slowing down. true or false