{"id":50,"date":"2021-01-17T05:17:59","date_gmt":"2021-01-16T17:47:13","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question043\/"},"modified":"2021-01-17T05:23:44","modified_gmt":"2021-01-17T05:23:44","slug":"certified-information-systems-security-professional-cissp-question043","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question043\/","title":{"rendered":"Certified Information Systems Security Professional &#8211; CISSP &#8211; Question043"},"content":{"rendered":"<div class=\"question\">Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments? <br \/><strong><br \/>A.<\/strong> Common Vulnerabilities and Exposures (CVE) <br \/><strong>B.<\/strong> Common Vulnerability Scoring System (CVSS) <br \/><strong>C.<\/strong> Asset Reporting Format (ARF) <br \/><strong>D.<\/strong> Open Vulnerability and Assessment Language (OVAL)<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments? A. Common Vulnerabilities and Exposures (CVE) B. Common Vulnerability Scoring System (CVSS) C. Asset Reporting Format (ARF) D. Open Vulnerability and Assessment Language (OVAL) Show Answer Hide Answer Correct Answer: B<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,391,46],"class_list":["post-50","post","type-post","status-publish","format-standard","hentry","category-certified-information-systems-security-professional-cissp","tag-certified-information-systems-security-professional-cissp","tag-choices","tag-question-043"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/50\/revisions"}],"predecessor-version":[{"id":440,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/50\/revisions\/440"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/media?parent=50"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/categories?post=50"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/tags?post=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}