A security administrator installed a new network scanner that identifies new host systems on the network. Which of the following did the security administrator install?
A. Vulnerability scanner
B. Network-based IDS
C. Rogue system detection
D. Configuration compliance scanner