jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Which is an example of shallow processing? A) Using Cornell notes to identify the main idea and supporting details in a passage B)Speed-reading C) Rereading for
Analiza morfologica a cuvintelor : copiilor , se amestecau
Breaking down information for quick repetition and memorization means using
True or False? Organisms respond to changing rhythms by evolving new characteristics.
What is the correct answer
Why is April having trouble concentrating the day before school
In such fields as lyric poetry, abstract math, and theoretical physics, the peak of creativity is often reached during _____.
What is the minimum amount of water you should drink every day.A.0.5 literB.1 literC.2 litersD.3 liters
1. Globalization threatens the environment. Pollution is one example. As globalization leads to economic development in developing nations, an unintended result
Variations in a species are preserved if _______________. at least two individuals in the species share the variation they progress the species toward its ide