When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. Which of the following is the type of vulnerability described?
A. Network based
B. IDS
C. Signature based
D. Host based
Answer: C. Signature based
Computer Science & Information Technology
You might also like to view...
In each of the following examples, there are two or three visual organizational principles at work. For example, name the principles.
What will be an ideal response?
Computer Science & Information Technology
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?
A. need-to-know B. eyes only C. least privilege D. separation of duties
Computer Science & Information Technology