____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.

A. OVAL
B. COBIT
C. CVE
D. CVSS

Answer: D

Computer Science & Information Technology

You might also like to view...

A business manager must think like a database developer when designing a database

Indicate whether the statement is true or false

Computer Science & Information Technology

A merge field is considered a placeholder in the Word main document

Indicate whether the statement is true or false

Computer Science & Information Technology