jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Silicone and other basic elements used to make computer chips are ________ from the factor of production we call land.
Given the statement: int list[25]; The index can go from 0 to 25 inclusive withoutgoing beyond the end of the array.true or false?
What can prayer do for the one who prays?
BRAINLY PLUS POINTS Please do question three. If you can't do question four that's fine;)
Is heating CuSo4 • 5H2O chemical or physical and why?​
Sequence the paragraphs by typing letters (a-e) in the right order.a) Furthermore, the financial implications of organ cloning are astronomical and it is unlike
jessie estimates the weight of her cat to be 8 pounds the actual weight was 10 pounds. find the percent error
Item 5 Item 5 _____ is the study of the role of sport in society, its impact on participants in sport, and the relationship between sport and other societal ins
One of two types of nitrogenous bases found in nucleotides, characterized by a six-membered ring fused to a five-membered ring. Adenine (A) and guanine (G)True
Match the items. A. A business should report the least favorable figures in the financial statements when two or more possible options are presented B. A busin