A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for anFTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor.Which of the following BEST describes the reason why the vulnerability exists?

A. Default configuration
B. End-of-life system
C. Weak cipher suite
D. Zero-day threats


Answer: B. End-of-life system

Computer Science & Information Technology

You might also like to view...

What is the Java expression for 4a2 + 2b * c?

a. (4 * a) + (2 * b) * c b. (4 * a * a) + ((2 * b) * c) c. ((4 * a * a) + (2 * b)) * c d. (4 + a * a) + ((2 + b) * c)

Computer Science & Information Technology

Normal view contains all of the following parts EXCEPT ________

A) Slides/Outline pane B) Notes pane C) Slide Show pane D) Slide pane

Computer Science & Information Technology

_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.

A. Java runtime environment (JRE) B. Java eclipse framework connectivity (JEFC) C. Java virtual machine (JVM) D. Java database connectivity (JDBC)

Computer Science & Information Technology

Use the ____________________ option in the Word Options dialog box to change the default location for templates that you create.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology