subject

(Please answer! Correct answer gets brainliest!) An attacker found an open port in the network and used that to gain access to the network and view confidential information. This is an example of a(n):
Vulnerability
Exploit
Risk
Safeguard

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 15:00
Much has been made of the new web 2.0 phenomenon, including social networking sites and user-created mash-ups. how does web 2.0 change security for the internet? how do secure software development concepts support protecting applications?
Answers: 1
question
Computers and Technology, 22.06.2019 17:30
The forerunner to cell phones, pdas, and smartphones was
Answers: 1
question
Computers and Technology, 22.06.2019 18:00
Suppose an astronomer discovers a large, spherical-shaped body orbiting the sun. the body is composed mostly of rock, and there are no other bodies sharing its orbit. what is the best way to categorize this body? a. planet b. moon c. comet d. asteroid
Answers: 1
question
Computers and Technology, 23.06.2019 08:00
Match the items with their respective descriptions.
Answers: 1
You know the right answer?
(Please answer! Correct answer gets brainliest!) An attacker found an open port in the network and...
Questions
question
Mathematics, 19.09.2019 23:00
Questions on the website: 13722361