The method most likely used to identify legacy systems is:
B. Vulnerability scan.
A vulnerability scan assesses systems for known vulnerabilities, outdated software versions, and unsupported systems. This makes it an effective way to identify legacy systems that may no longer be receiving security updates or support.
A. Bug bounty program: This focuses on crowdsourcing the identification of specific vulnerabilities but is not primarily aimed at identifying legacy systems.
C. Package monitoring: Tracks software packages for updates, but it doesn't specifically target legacy systems.
D. Dynamic analysis: Involves testing software during runtime for vulnerabilities but is not typically used to identify legacy systems.
A vulnerability scan is the most effective approach for identifying legacy systems in an environment
Package monitoring is more focused on the status of individual software packages rather than identifying entire systems that are outdated or considered legacy.
upvoted 2 times
...
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Murtuza
6 months, 3 weeks agojafyyy
8 months, 2 weeks agoCyberity
8 months, 3 weeks agojafyyy
8 months, 2 weeks ago