Metrics like the attack vector, complexity, exploit maturity, and how much user interaction is required are all found in what scoring system?
A. CVE
B. CVSS
C. CNA
D. NVD
Answer: B. CVSS
Computer Science & Information Technology
You might also like to view...
A virtual assistant is used to
A) Complete paperwork that is sent to a fax machine B) Dictate notes to be placed in mobile contact files C) Obtain the latest news and sports scores, send information D) Obtain information; dictate emails, phone call requests, or text
Computer Science & Information Technology
If a class is named MyClass, what must the destructor be named?
a)``` Erase ``` b)``` MyClass ``` c)Any name the programmer wishes except the name of the class d)``` ~MyClass ``` e) None of the above.
Computer Science & Information Technology