Metrics like the attack vector, complexity, exploit maturity, and how much user interaction is required are all found in what scoring system?

A. CVE
B. CVSS
C. CNA
D. NVD

Answer: B. CVSS

Computer Science & Information Technology

You might also like to view...

A virtual assistant is used to

A) Complete paperwork that is sent to a fax machine B) Dictate notes to be placed in mobile contact files C) Obtain the latest news and sports scores, send information D) Obtain information; dictate emails, phone call requests, or text

Computer Science & Information Technology

If a class is named MyClass, what must the destructor be named?

a)``` Erase ``` b)``` MyClass ``` c)Any name the programmer wishes except the name of the class d)``` ~MyClass ``` e) None of the above.

Computer Science & Information Technology