Which two security risks are created by legacy approaches to networking? (Choose two.)