jacksonhoyt7532 jacksonhoyt7532 Today at 2:47 PM Computers and Technology Answered 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above