jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Which of the following is NOT a characteristic of minerals? crystalline structure formed by inorganic processes definite chemical composition either liquid or
What is the oxidation number of phosphorus (P) in phosphoric acid (H3PO4)?
What Is The Ability Of The Body To Function Successfully And Efficiently During Physical Activity ? A)Exercise B)Physical Fitness C)Muscular Strength D) Fle
need help please answer
How can you tell which elements are more metallic than others by just looking at the periodic table?
Who wrote the famous novel set during the Dust Bowl, The Grapes of Wrath?
Which tool will help you replace overused words in a text? a. Dictionary b. Spell check c. Thesaurus d. Wikipedia
A participle is a verb form that is used as a(n) ______________. a. noun. b. adjective. c. preposition. d. conjunction. 2. Identify the participial phra
if jim’s work shift starts at 8:45 a.m. and jim arrives to work at 9:13 a.m., how many minutes late was jim?
What is the relationship between electric and magnetic fields?