jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

list 4 common comands found in email applications
What city did king Narmer rule?
bölenin 8,bölümün 68 olduğu bir bölme işleminde bölünen sayı en fazla kaç olur​
Who causes the French wars of revolution? Help plz
can someone tell me which two are wrong?
Stalin was: A cruel B lively C benevolent D kind
In DNA and RNA, what “codes for amino acids”?
SOMEONE PLSSS HELP ME ON NUMBER 7& 8 PLSSSSSS
A yield can be paid in the form of?
which two factors often determine the type of rock that is formed by a process? NEEED HELP ASAPPP