| { | |
| "total_examples": 1244, | |
| "documents_processed": 14, | |
| "variant": "core", | |
| "weight_multiplier": 5, | |
| "cmmc_level_distribution": { | |
| "3": 579, | |
| "all": 561, | |
| "2": 104 | |
| }, | |
| "domain_distribution": { | |
| "Risk Assessment": 567, | |
| "Maintenance": 567, | |
| "Access Control": 567, | |
| "System and Communications Protection": 567, | |
| "System and Information Integrity": 567, | |
| "Incident Response": 567, | |
| "Physical Protection": 567, | |
| "Identification and Authentication": 567, | |
| "Planning": 567, | |
| "System and Services Acquisition": 567, | |
| "Media Protection": 567, | |
| "Awareness and Training": 567, | |
| "Audit and Accountability": 567, | |
| "Supply Chain Risk Management": 567, | |
| "Configuration Management": 567, | |
| "Personnel Security": 567, | |
| "Security Assessment": 567 | |
| } | |
| } |