jacksonhoyt7532 jacksonhoyt7532 03-03-2020 Computers and Technology contestada 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above