| { | |
| "total_examples": 2790, | |
| "documents_processed": 71, | |
| "variant": "balanced", | |
| "weight_multiplier": 3, | |
| "cmmc_level_distribution": { | |
| "all": 2247, | |
| "3": 301, | |
| "1": 118, | |
| "2": 124 | |
| }, | |
| "domain_distribution": { | |
| "Audit and Accountability": 840, | |
| "System and Information Integrity": 840, | |
| "Security Assessment": 840, | |
| "Media Protection": 840, | |
| "Identification and Authentication": 840, | |
| "Awareness and Training": 840, | |
| "System and Communications Protection": 840, | |
| "Access Control": 840, | |
| "Planning": 840, | |
| "Incident Response": 840, | |
| "Risk Assessment": 840, | |
| "Personnel Security": 840, | |
| "System and Services Acquisition": 840, | |
| "Supply Chain Risk Management": 825, | |
| "Maintenance": 840, | |
| "Physical Protection": 840, | |
| "Configuration Management": 823 | |
| } | |
| } |