Ben wants to interface with the National Vulnerability Database using a standardized protocol. What option should he use to ensure that the tools he builds work with the data contained in the NVD?

A. XACML
B. SCML
C. VSML
D. SCAP


Answer: D. SCAP

Computer Science & Information Technology

You might also like to view...

In addition to running on different operating systems. Ruby also supports execution within various virtual machine environments, including ____.

A. JRuby B. IronRuby C. Both of the above D. Neither of the above

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Track errors and check worksheet logic. B. Notes about a workbook that appear when the pointer is placed over a cell. C. File extension for a workbook based on a template. D. File extension for a template. E. Create workbooks based on a template.

Computer Science & Information Technology

Why would you use an append query?

What will be an ideal response?

Computer Science & Information Technology

________ servers synchronize directory servers from different vendors.

Synchronization LDAP Metadirectory Central authentication

Computer Science & Information Technology