Answer: The following BEST describes where the administrator should look to find information on the attack to determine if a response must be prepared for the systems:
Step-by-step explanation:
The numbered reference system used to catalog revealed vulnerabilities is called the common vulnerability and exposure system.
It is a dictionary of publicly disclosed cybersecurity vulnerabilities and exposures that is free to search, use and incorporate products and services, according to the terms of use.
The CVE list feeds the US National Vulnerability Database.