According to CVSS, what is a description of the attack vector score?
What is the relationship between a vulnerability and a threat?
Refer to the exhibit.
Which application-level protocol is being targeted?
Which two elements are used for profiling a network? (Choose two.)