When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
A. system sprawl
B. end-of-life sys
tems
C. resource exhaustion
D. a default configuration
When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
A. system sprawl
B. end-of-life sys
tems
C. resource exhaustion
D. a default configuration