jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Why was the Ems telegram of particular importance? (a) It started the Austro-Prussian War. (b) It ended the Austro-Prussian War. (c) It started the Franco-Pruss
Which construction might this image result from? A) Construction to copy a line segment. B) Construction of a perpendicular bisector C) Construction of a perpen
Lifting weights and valves balanced and unbalanced forces when the lifter first raises the barbell off the ground he exerts an unbalanced force his pole is grea
712,350 nearest hundred thousand
how long is a half life for c14
how does the author of “learning guitar” mostly reveal the character of holly’s mother? a) through her interactions with other characters b) through her actions
My question is attatched. Please hurry I need it ASAP!
What was the main reason for the popularity of The Canterbury Tales in medieval England? A.The work was a retelling of an extremely popular oral tale. B.It was
A spherical water tank has a diameter of 42 feet. How much water can the tank hold when full? A) 10,561π cubic feet B) 12,348π cubic feet C) 15,934π cubic f
Which property justifies the following equation 7(0+5)=7*0+7*5? A. distributive B. commutative C. associative D. identity