When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
A . system sprawl
B . end-of-life systems
C . resource exhaustion
D . a default configuration
Answer: B
When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
A . system sprawl
B . end-of-life systems
C . resource exhaustion
D . a default configuration
Answer: B