Coursera Answers

4.2.8 Check Your Understanding – Identify CVSS Metrics Quiz Answer

4.2.8 Check Your Understanding - Identify CVSS Metrics Quiz Answer


Cyber Threat Management

Endpoint Vulnerability Assessment

in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.2.8 Check Your Understanding – Identify CVSS Metrics Quiz Answer with you..


4.2.8 Check Your Understanding – Identify CVSS Metrics


Question 1)

Which CVSS metric captures the level of access that is required for a successful exploit of the vulnerability?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction



Question 2)

Which CVSS metric expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and that must be present for a vulnerability to be successfully exploited?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction



Question 3)

Which CVSS metric expresses whether multiple authorities must be involved in an exploit?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction



Question 4)

Which CVSS metric reflects the proximity of the threat actor to the vulnerable component?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction



Question 5)

Which CVSS metric expresses whether human action is required for the exploit to succeed?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction