jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

Which technological development enabled European navigators to determine their location during the Age of Exploration? (1) lateen sail (2) astrolabe (3) cross
Place the mouse, fruit fly, duck, and gorilla in order of their relatedness to humans, from least related to most related. a. mouse - fruit fly - duck - gorilla b
How many prime numbers are there between 56 and 100?
If y^8= 4 and y^7=3/x, what is the value of y in terms of x?
given: quadrilateral ABCD with ∠A= ∠C and BD the bisector ∠ABC prove: DB bisects ∠ADC
Which technological development enabled European navigators to determine their location during the Age of Exploration? (1) lateen sail (2) astrolabe (3) cross
given: quadrilateral ABCD with ∠A= ∠C and BD the bisector ∠ABC prove: DB bisects ∠ADC
the rectangles on a quilt are 2in. wide and 3in. long the perimeter of each rectangle is made by pattern of ref thread. if there are 30 rectangles in the quilt,
How many prime numbers are there between 56 and 100?
In the formula e = hf, if e is doubled and f is halved, what happens to the value of h?