Which two security risks are created by legacy approaches to networking’? (Choose two.)