4.2.8 Check Your Understanding
Hello Friends in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.2.8 Check Your Understanding – Identify CVSS Metrics Quiz Answer with you..
Endpoint Vulnerability Assessment
Also visit this link: 4.1.5 Check Your Understanding
4.2.8 Check Your Understanding – Identify CVSS Metrics
Question 1) Which CVSS metric captures the level of access that is required for a successful exploit of the vulnerability?
- Attack complexity
- Attack vector
- Privileges required
- Scope
- User interaction
Question 2) Which CVSS metric expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and that must be present for a vulnerability to be successfully exploited?
- Attack complexity
- Attack vector
- Privileges required
- Scope
- User interaction
Question 3) Which CVSS metric expresses whether multiple authorities must be involved in an exploit?
- Attack complexity
- Attack vector
- Privileges required
- Scope
- User interaction
Question 4) Which CVSS metric reflects the proximity of the threat actor to the vulnerable component?
- Attack complexity
- Attack vector
- Privileges required
- Scope
- User interaction
Question 5) Which CVSS metric expresses whether human action is required for the exploit to succeed?
- Attack complexity
- Attack vector
- Privileges required
- Scope
- User interaction