Get comprehensive answers to your questions with the help of IDNLearn.com's community. Get step-by-step guidance for all your technical questions from our dedicated community members.

Generally, the base and temporal metrics are specified by vulnerability bulletin analysts, security product vendors, or application vendors because they typically have better information about the characteristics of a vulnerability than do users.
a. True
b. False