____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.

A. OVAL
B. COBIT
C. CVE
D. CVSS


Answer: D

Computer Science & Information Technology

You might also like to view...

The life cycle of a program begins with describing a problem and making a plan. Then the PDLC requires

a. coding, debugging, and testing. b. process, input, and output. c. data, information, and method. d. an algorithm.

Computer Science & Information Technology

Files with uppercase letters or spaces in their names might appear as broken links when published on a Web server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____________________ shows the current frame plus two or more frames on the Stage at once.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Creating task dependencies does not affect the start and finish dates of the linked tasks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology