When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
A.
system sprawl
B.
end-of-life systems
C.
resource exhaustion
D.
a default configuration
When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
A.
system sprawl
B.
end-of-life systems
C.
resource exhaustion
D.
a default configuration