jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

1.5 yards of ribbon If each ribbon costs 10 cents per foot, what is total cost of ribbon in dollars
how many chromosomes are in each body cell of the female rabbit?
What is the range of f(x)=x2+4 if the domain is {2,0,1}
which river is most closely associated with Hinduism?
During World War I, developments in military technology led to (1) an early victory by the Allied powers (2) the establishment of industrial capitalism (3) the
a machine grinds 2/7 pound of spices in 1/3 second. what is the machines rate, in pounds per second of grinding spice
How did Britain respond to the French Revolution? A) They went to war against the revolutionary government. B) They supported the revolutionary government. C
35 Given the word equation: sodium chlorate ==> sodium chloride + oxygen Which type of chemical reaction is represented by this equation? (1) double replacem
two adjectives or descriptive phrases of James Madison
In the 195os, what was the status of most countries in Eastern Europe? (1) members of the Common Market (2) participants in the Marshall Plan (3) allies of the