Metrics like the attack vector, complexity, exploit maturity, and how much user interaction is required are all found in what scoring system?
A. CVE
B. CVSS
C. CNA
D. NVD
Answer: B. CVSS
Computer Science & Information Technology
You might also like to view...
List four standard operations that can be performed by the LDAP protocol.
What will be an ideal response?
Computer Science & Information Technology
How do you create a new folder in File Explorer?
A) Click Create in the Navigation pane. B) Double click an empty space. C) Click New Folder in the New Group on the Home Tab. D) Click New Folder on the Create Tab.
Computer Science & Information Technology
Both Stretch Horizontal and Stretch Vertical Zoom settings can distort the image displayed on a form
Indicate whether the statement is true or false
Computer Science & Information Technology
This command is not available on Windows, but on a computer running Linux or Mac OS X, this command will let you diagnose DNS problems.
A. nslookup B. ping C. ipconfig D. dig
Computer Science & Information Technology