Which of the following Impacts are associated with vulnerabilities in embedded systems? (Select TWO).
A . Repeated exploitation due to unpatchtable firmware
B . Denial of service due to an integrated legacy operating system
C . Loss of inventory accountability due to device deployment
D . Key reuse and collision Issues due to decentralized management
E . Exhaustion of network resources resulting from poor NIC management
Answer: A,B