When performing the daily review of the system vulnerability scans of the network Joe, the
administrator, noticed several security related vulnerabilities with an assigned vulnerability
identification number. Joe researches the assigned vulnerability identification number from
the vendor website. Joe proceeds with applying the recommended solution for identified
vulnerability. Which of the following is the type of vulnerability described?
A.
Network based
B.
IDS
C.
Signature based
D.
Host based