Question 28:
Which metric is used to capture the level of access needed to launch a successful attack?
Answer options:
A. privileges required B. user interaction C. attack complexity D. attack vector
Answer correct:
A