1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All

of the above e. None of the above
Computers and Technology
1 answer:
ELEN [110]3 years ago
7 0

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

You might be interested in
Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
attashe74 [19]

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

6 0
3 years ago
What qualities in an employee are highly desired by employers?
slava [35]
Flexibility and open-mindedness
being quick to adapt to technology changes
having a positive attitude
taking initiative to solve problems
5 0
3 years ago
Read 2 more answers
What are the optional parameters when configuring DHCP
stealth61 [152]

Answer:

DHCP is the dynamic host configuration protocol that enable the server for assigning the IP address to the computer. It is basically used to provide automatic IP addresses within the network. It is basically used to configure the default gateway and provide the DNS server data in the device.  

The optional parameter when configuring DHCP are:

  • Sub-net mask
  • Router
  • Domain server
  • Broadcast address
  • Host name
5 0
3 years ago
A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage se
PtichkaEL [24]

A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage service should the company

use is

D. Amazon EFS

Explanation:

  • A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage service should the company

        use is

  • D. Amazon EFS
  • Amazon Elastic File System (Amazon EFS) provides a simple, a fully managed elastic NFS file system for use with AWS Cloud services.
  • EFS is NFS filesystem.
  • It has two storage classes,
  • the Standard storage class
  • the Infrequent Access storage class
  • Amazon EFS is highly suitable to support a broad spectrum of use cases from home directories to business-critical applications.
4 0
3 years ago
What is the benefits of using pointers​
Leno4ka [110]

Answer:

One benefit of pointers is when you use them in function arguments, you don't need to copy large chunks of memory around, and you can also change the state by dereferencing the pointer. For example, you may have a huge struct MyStruct, and you have a function a ().

Explanation:

3 0
2 years ago
Other questions:
  • Write a program that inputs a line of text and uses a stack object to print the line reversed.
    14·1 answer
  • Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practic
    7·1 answer
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • Which of the following commands contains an error?
    8·1 answer
  • Membrane-bound organelles are not found in the cells of A) bacteria. B) fungi. C) plants. Eliminate D) protists.
    15·2 answers
  • What practices will help you avoid sending out e-mail to the wrong person?
    15·1 answer
  • Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
    11·1 answer
  • "What line of code can be used to provide a convenient way to merge the source code from one file with the source code in anothe
    8·1 answer
  • Berat wants to compare images of what the streets of New York City looked like one hundred years ago to now. Which of the follow
    14·2 answers
  • Your connection to this site is not secure how to fix.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!