jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Find the area. 8 m 4 m 7 m square meters
Anyone like Nick Jonas?
Solution set of 5/11x+1/3=3/7-6/11x+3/7
Factor the expression completely. 21x^4+70x
Tina and Tracey are putting 70 things from their present lives into a few boxes, and they are going to bury the boxes so they can dig them up in the future. If
n:1/2 as 6:1 PLS HELP x=
the federal district courts have
Round 0.2346129 to 2 decimal places (to the nearest hundredths)
Two young men were twins. When one died, the other could not live without twin stars. eus changed them into legend myth fiction
i messed up my last question so this one is the good one. (the first 2 pictures r together in da same question.The last 3 pictures are for da same question)