____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.
A. OVAL
B. COBIT
C. CVE
D. CVSS
Answer: D
Computer Science & Information Technology
You might also like to view...
A business manager must think like a database developer when designing a database
Indicate whether the statement is true or false
Computer Science & Information Technology
A merge field is considered a placeholder in the Word main document
Indicate whether the statement is true or false
Computer Science & Information Technology