Metrics like the attack vector, complexity, exploit maturity, and how much user interaction is required are all found in what scoring system?

A. CVE
B. CVSS
C. CNA
D. NVD


Answer: B. CVSS

Computer Science & Information Technology

You might also like to view...

List four standard operations that can be performed by the LDAP protocol.

What will be an ideal response?

Computer Science & Information Technology

How do you create a new folder in File Explorer?

A) Click Create in the Navigation pane. B) Double click an empty space. C) Click New Folder in the New Group on the Home Tab. D) Click New Folder on the Create Tab.

Computer Science & Information Technology

Both Stretch Horizontal and Stretch Vertical Zoom settings can distort the image displayed on a form

Indicate whether the statement is true or false

Computer Science & Information Technology

This command is not available on Windows, but on a computer running Linux or Mac OS X, this command will let you diagnose DNS problems.

A. nslookup B. ping C. ipconfig D. dig

Computer Science & Information Technology