ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 233 - SY0-701 discussion

Report
Export

Which of the following methods would most likely be used to identify legacy systems?

A.
Bug bounty program
Answers
A.
Bug bounty program
B.
Vulnerability scan
Answers
B.
Vulnerability scan
C.
Package monitoring
Answers
C.
Package monitoring
D.
Dynamic analysis
Answers
D.
Dynamic analysis
Suggested answer: B

Explanation:

A vulnerability scan is the most likely method to identify legacy systems. These scans assess an organization's network and systems for known vulnerabilities, including outdated or unsupported software (i.e., legacy systems) that may pose a security risk. The scan results can highlight systems that are no longer receiving updates, helping IT teams address these risks.

Bug bounty programs are used to incentivize external researchers to find security flaws, but they are less effective at identifying legacy systems.

Package monitoring tracks installed software packages for updates or issues but is not as comprehensive for identifying legacy systems.

Dynamic analysis is typically used for testing applications during runtime to find vulnerabilities, but not for identifying legacy systems.

asked 02/10/2024
Kanik Sachdeva
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first