cisco

4.2.8 Check Your Understanding

Hello Friends in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.2.8 Check Your Understanding – Identify CVSS Metrics Quiz Answer with you..

Endpoint Vulnerability Assessment


Also visit this link:  4.1.5 Check Your Understanding


 

4.2.8 Check Your Understanding – Identify CVSS Metrics

Question 1) Which CVSS metric captures the level of access that is required for a successful exploit of the vulnerability?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction

Question 2) Which CVSS metric expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and that must be present for a vulnerability to be successfully exploited?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction

Question 3) Which CVSS metric expresses whether multiple authorities must be involved in an exploit?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction

Question 4) Which CVSS metric reflects the proximity of the threat actor to the vulnerable component?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction

Question 5) Which CVSS metric expresses whether human action is required for the exploit to succeed?

  • Attack complexity
  • Attack vector
  • Privileges required
  • Scope
  • User interaction
Hello Friends in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.2.8 Check Your Understanding – Identify CVSS Metrics Quiz Answer with you..