During the vulnerability scan, you identified a vulnerable service in the linux victim system. The name of the vulnerable service is the telnet service. The telnet service is a command user with an underlying TCP/IP protocol for the ability to approach remote computer software. Using this server, the administrator can access an individuals' computer.