jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

If x +2 is a factor of p(x) =x²-kx +7, thrn find the value of k.Also,find the other factor of the polynomial ?​
This acceleration function represents the acceleration of a subatomic particle: a(t) = 6t² - 8t The particle has an initial velocity of 1 m/s. What is the veloc
The width, of a rectangle is 1/2 of its length. What are the sides of the rectangle if its perimeter is 63 in
The sum of 2.236 and 7.555.. must be : A) Rational B) Irrational C) An integer D) A whole number
From earth why dose the sun look so much larger than other stars ? Is the sun actually larger than the stars outside our solar system ? Explain your ideals belo
1.07 x 104 -3.38 × 10³
what is the principle of foreign policy of Nepal​
b) An earthed conductor was brought near the charged student. A spark jumped between the conductor and the student. The potential difference between the conduct
A student graphed distance versus time for an object that moves 14m every 2 s. the speed of the object is
A car starts from rest and travels for 4.0s with a uniform acceleration of + 1.3m/s^2. The driver then applies the brakes, causing a uniform acceleration of - 1