In __________________ indicates that a successful exploitation of this vulnerability would yield partial access to information. This is the middle value for this metric.
a. "C:P"
b. "AV:N"
c. "AC:L"
d. "Au:N"