1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All

of the above e. None of the above
Computers and Technology
1 answer:
ELEN [110]3 years ago
7 0

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

You might be interested in
What are some differences between CUI and GUI ?
ollegr [7]

Answer:

Even though both are interfaces and serve its purpose of attempting to run the strategies, their components as well as the manipulate they will get from the patient differ.

Explanation:

CUI (Character User Interface) :-

  • It's a sort of user interface that only uses binary data and pseudographics for interface-output and data sessions.
  • That's characterized by low availability for operating systems I / O resources (act with integrity) and high speed with a display of data.

GUI (Graphical User Interface (GUI):-

  • Using graphical elements such as windows, icons, menus helps the user to communicate with the program.
  • It is a kind of user interface along which people interact with electronic equipment through characterizations of visual indicators.
3 0
3 years ago
When you format text, what are you doing?
vova2212 [387]

Answer:

d

Explanation:

7 0
4 years ago
Read 2 more answers
What are two best practices for discovering whether a message you’ve scheduled with Hootsuite has failed to send?
never [62]
I think:
<span>  C)  Regularly check Publisher's 'Rejected' Tab  <span>D)  Enable email notifications for failed messages under Preferences</span></span>

But I am not sure.
4 0
3 years ago
Read 2 more answers
What are general purpose computer and special purpose computer?​
icang [17]

Answer:

General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.

3 0
3 years ago
Read 2 more answers
5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour,
MakcuM [25]
Well the awnser that you are looking for is not here and I am verry sorry about that I just need points for my awnser
5 0
3 years ago
Other questions:
  • A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
    8·1 answer
  • An objective test or measurement that technology product evaluators use to compare two or more products is ____.
    12·1 answer
  • What is a search engine and how is it different from a browser?
    6·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • Network access control authenticates users logging into the network and determines what data they can access and actions they ca
    7·1 answer
  • C++ Proagram
    7·1 answer
  • viewRatings(string, int) Takes a username and a minimum rating value. It prints all the books that the user has rated with a val
    10·1 answer
  • If your earning potential is higher than the cost of your higher education,<br> you will have a
    8·1 answer
  • What is folded card publishing?​
    5·2 answers
  • Choose the 3 Points in good story telling
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!