jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

what are 3 types of music from indonesia and its meaning and interpretation
B is the midpoint of AC and E is the midpoint of BD. if A(-9, -4) and E(-4, -3), find the coordinates of D
Select all the correct answers.Which two events spurred the need to chart new maritime routes?An increasing population forced Europeans to look for new lands to
Mr. McGill is telling the type of number is and puts rational as his answer. What error, did Mr. McGill make and what should the correct answer be?
In humans, three alleles affect blood type. The A and B alleles are codominant and the O allele is recessive. Which of the following answer choices is true? COR
Choose the correct answers
please help with the question below
Jane is saving to buy a cell phone. She is given a $100 gift to start and saves $35 a month from her allowance. So after 1 month, Jane has saved $135. Does it m
Ali currently has $25. He is going to start saving $5 every week. Which equation represents this situation? y = 25x – 5 y = 5x + 25 y = 25x + 5 y = 5x – 25
Sam needs to catch an Uber. The Uber charges a fixed charge of $10 plus 0.40 per mile. Find the number of miles Sam can go if he spends at most $20 on the ride