Dram6601 Dram6601 28-03-2024 Computers and Technology contestada In __________________indicates that a successful exploitation of this vulnerability would have no availability impact. This is the least serious value for this metric.a. "A:N" b. "I:N" c. "C:P" d. "AV:N"