PrepAway - Latest Free Exam Questions & Answers

Which of the following is the type of vulnerability described?

When performing the daily review of the system vulnerability scans of the network Joe, the
administrator, noticed several security related vulnerabilities with an assigned vulnerability
identification number. Joe researches the assigned vulnerability identification number from the
vendor website. Joe proceeds with applying the recommended solution for identified vulnerability.
Which of the following is the type of vulnerability described?

PrepAway - Latest Free Exam Questions & Answers

A.
Network based

B.
IDS

C.
Signature based

D.
Host based

Explanation:
A signature-based monitoring or detection method relies on a database of signatures or patterns
of known malicious or unwanted activity. The strength of a signature-based system is that it can
quickly and accurately detect any event from its database of signatures.

One Comment on “Which of the following is the type of vulnerability described?


Leave a Reply