Lintor6959 Lintor6959 28-03-2024 Computers and Technology contestada In __________________ indicates that a successful exploitation of this vulnerability would yield partial access to information. This is the middle value for this metric.a. "C:P" b. "AV:N" c. "AC:L" d. "Au:N"