jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Factor the sum or difference..... and then chose the correct answer from the options below.
Why does dough rise very quickly in the day but it takes much longer to rise in the night ?
How to build a robot
Plz help me i dont know what to do
Please answer the attached question by selecting of the the given answers.
PLEASE ANSWER ASAP *picture attached*
Question5....................
Use dimensional analysis to convert the width of a bedroom to feet if it measures 132 inches.
Solve for y: (1-y)^1/7=(3y-7)^1/7
a gardener wants to create a rectangular vegetable garden in a backyard. She wants to have a total area of 108 square feet, and it should be 12 feet longer than