exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 269 discussion

Actual exam question from CompTIA's SY0-701
Question #: 269
Topic #: 1
[All SY0-701 Questions]

Which of the following is the most important security concern when using legacy systems to provide production service?

  • A. Instability
  • B. Lack of vendor support
  • C. Loss of availability
  • D. Use of insecure protocols
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
2fef490
Highly Voted 3 months, 3 weeks ago
Selected Answer: B
The most important security concern with legacy systems is the lack of vendor support. Without vendor support, there are no updates, security patches, or fixes for newly discovered vulnerabilities. This leaves the system exposed to potential attacks that cannot be easily mitigated, increasing the risk of security breaches.
upvoted 5 times
...
TonyStarChillingFromHeaven
Most Recent 3 days, 13 hours ago
Selected Answer: A
A - Lack of Vendor Support. Insecure protocols are a major concern, but they are often a symptom of the broader issue of lack of support and updates.
upvoted 1 times
...
jbmac
1 week, 6 days ago
Selected Answer: D
The correct answer is: D. Use of insecure protocols Explanation: Use of insecure protocols is the most critical security concern when using legacy systems to provide production services. Legacy systems often rely on outdated protocols that lack modern security features (such as encryption and secure authentication), making them vulnerable to various types of attacks (e.g., man-in-the-middle attacks, eavesdropping, etc.). These vulnerabilities can expose sensitive data and compromise the integrity of the system.
upvoted 4 times
Eracle
2 days, 5 hours ago
A legacy system suffers from a lack of patches, but this does not necessarily translate into the use of outdated protocols. It could also happen that a legacy system uses a protocol that is still up-to-date but suffers from the lack of a patch for a known vulnerability!
upvoted 1 times
...
...
laternak26
2 weeks, 5 days ago
Selected Answer: D
D. Use of insecure protocols: Legacy systems often rely on outdated protocols that are no longer considered secure by modern standards. These systems may use protocols that are vulnerable to attacks like eavesdropping, man-in-the-middle attacks, or data tampering because they do not support strong encryption or authentication methods.
upvoted 3 times
...
AndyK2
1 month, 1 week ago
Selected Answer: B
No ongoing security updates No patches for newly discovered vulnerabilities
upvoted 2 times
...
3dk1
2 months, 1 week ago
The more I think about it, the more I realize that legacy systems could still have secure protocols. I am going with lack of vendor support.
upvoted 1 times
...
User92
3 months, 1 week ago
Selected Answer: D
Given answer is correct - because legacy systems often rely on outdated and insecure protocols that can be easily exploited.
upvoted 2 times
...
cyoncon
3 months, 1 week ago
Selected Answer: B
Primary concern is vendor support.
upvoted 3 times
...
BluezClues
3 months, 1 week ago
Selected Answer: B
B. Lack of Vendor Support Why it isn't D. Use of Protocols: Many legacy systems use outdated and insecure protocols, which is certainly a concern, but insecure protocols can often be mitigated by wrapping them in secure communication channels (e.g., VPNs, encryption). The lack of vendor support to address these insecure protocols is actually a greater problem than their presence because there’s no way to patch or upgrade them without vendor assistance.
upvoted 4 times
...
BluezClues
3 months, 1 week ago
B. Lack of Vendor Support Why it isn't D. Use of Protocols: Many legacy systems use outdated and insecure protocols, which is certainly a concern, but insecure protocols can often be mitigated by wrapping them in secure communication channels (e.g., VPNs, encryption). The lack of vendor support to address these insecure protocols is actually a greater problem than their presence because there’s no way to patch or upgrade them without vendor assistance.
upvoted 3 times
...
a0bfa81
3 months, 1 week ago
Selected Answer: B
The most important security concern when using legacy systems is the lack of vendor support. Without vendor support, legacy systems may not receive essential security updates, patches, or technical assistance, leaving them vulnerable to known exploits and threats. This can significantly increase the risk of security breaches.
upvoted 3 times
...
nyyankee718
3 months, 1 week ago
Selected Answer: B
insecure protocol is an issue but would be greater without vender support
upvoted 1 times
...
Examplary
3 months, 1 week ago
Selected Answer: D
Legacy Systems - Outdated computing software, hardware, or other technologies that have been largely superseded by newer and more efficient alternatives. Unsupported Systems - Hardware or software products that no longer receive official technical support, security updates, or patches from their respective vendors or developers. Just because something is legacy does not mean that it's no longer supported by the vendor. However, it does mean that it is likely using outdated technologies/protocols. I vote D.
upvoted 1 times
...
NONS3c
4 months ago
Selected Answer: D
it is correct
upvoted 1 times
...
17f9ef0
4 months ago
Selected Answer: D
Answer is D
upvoted 1 times
...
Syl0
4 months, 1 week ago
hmmm, if it's security concern, shouldn't it be D use of insecure protocol?
upvoted 1 times
...
Cee007
4 months, 2 weeks ago
Selected Answer: D
The answer is D. Legacy systems rely on outdated protocols which often contain vulnerabilities that attackers can exploit. They may also lack the security features to protect against modern threats.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago