jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Explain what is the same about two fractions that are like fractions
Explain what is the same about two fractions that are like fractions
what is the sum of 7/10 and 6/100
what is the sum of 7/10 and 6/100
what is the sum of 7/10 and 6/100
having troubles with inequalities.. 3.8x + 14.5 < 32
Explain what is the same about two fractions that are like fractions
which trinomial is equivalent to (3x-1)(x+4)
Explain what is the same about two fractions that are like fractions
Explain what is the same about two fractions that are like fractions