What type of protocol is represented by the number 6?
What type of communication protocol does Modbus RTU use?
Which of the CVSS metrics refer to the exploit quotient of the vulnerability?
What step of the malware infection installs the malware on the target?