exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 171 discussion

Actual exam question from CompTIA's SY0-601
Question #: 171
Topic #: 1
[All SY0-601 Questions]

A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?

  • A. Default system configuration
  • B. Unsecure protocols
  • C. Lack of vendor support
  • D. Weak encryption
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
hac_cah
Highly Voted 3 years, 2 months ago
Selected Answer: C
Lack of vendor support implies no security patches. Unsecure protocols are not necessarily always the case.
upvoted 31 times
ishallgetit
3 years ago
"security patches" convince me that C is correct answer
upvoted 5 times
...
...
elberG
Highly Voted 3 years, 1 month ago
The risk is Unsecure protocols, that it's cause by lack of vendor support.
upvoted 13 times
andrizo
2 years, 6 months ago
not necessarily unsecure, just outdated security
upvoted 1 times
RyanL26
1 year ago
Outdated is considered unsecure...
upvoted 1 times
RyanL26
1 year ago
C is correct.
upvoted 1 times
...
...
...
...
Pele9
Most Recent 10 months ago
Selected Answer: B
The question asks, "which of the following BEST explains a risk of this practice?" in my opinion, from the question, the practice is lack of vendor support but the risk of this lack of vendor support is unsecure protocols. So B is the answer.
upvoted 1 times
...
ImBleghk
1 year, 3 months ago
Selected Answer: C
C. Lack of vendor support
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 9 months ago
Selected Answer: C
The risk of using legacy software is primarily associated with the lack of vendor support. As software ages and becomes outdated, vendors may stop providing updates, security patches, and technical support for it. This lack of support leaves the software vulnerable to new security threats, and any newly discovered vulnerabilities or bugs may remain unaddressed. Hackers can exploit these unpatched vulnerabilities to compromise the system and gain unauthorized access. Continuing to use legacy software without adequate vendor support also means that the company may not receive assistance in case of technical issues or problems. This could result in increased downtime, decreased system performance, and potential data loss. Additionally, legacy software may not be compatible with modern security standards, protocols, and encryption methods, leading to security weaknesses and a higher risk of cyberattacks.
upvoted 4 times
...
HypeMan_crew
2 years ago
Selected Answer: C
I would have gone with B initially but if a company is using an outdated software for a critical app, vendors will not want to support them at all because any risk or threat that happens, they can be responsible. The answer is clearly "lack of vendor support"
upvoted 2 times
...
JagamonFiya
2 years, 2 months ago
Lack of vendor support (C) is not a risk. the question asked "Which of the following BEST explains a risk of this practice?" i.e. what happens when there is a lack of vendor support because your using Legacy systems.....answer= unsecure protocols
upvoted 2 times
...
viksap
2 years, 4 months ago
Selected Answer: C
Agree with C since no patches will be available will increase security risk
upvoted 1 times
...
J_Ark1
2 years, 5 months ago
Selected Answer: C
Going with the most correct answer here would be C as I searche dthe definition of Legacy online and saw that it literall means "out of date" systems and I am reminded of the recent updates such as how phone companies say they wont support old phones made only 5 years ago (im shocked to think that so many resources go into making a device so short lived - what happened to long life products lol)
upvoted 1 times
...
darkgypsy
2 years, 5 months ago
Selected Answer: C
Legacy Systems - Legacy systems are a source of risk because they no longer receive security updates and because the expertise to maintain and troubleshoot them is a scarce resource
upvoted 2 times
...
Orean
2 years, 6 months ago
Selected Answer: C
It's perfectly plausible for legacy systems to have protocol issues, but the scenario doesn't state that. All we can definitively infer is that the legacy system—by definition—is not being actively supported or maintained by the vendor, which can cause various issues.
upvoted 3 times
...
zharis
2 years, 6 months ago
Selected Answer: B
legacy items have protocol issues.
upvoted 3 times
daddylonglegs
1 year, 6 months ago
Maybe, maybe not. But the thing to understand here is that if there is a security issue in a supported product then the vendor is on the hook to fix it. If you are using something that is not supported, you assume 100 percent of the risk by continuing to use it. The software may use an outdated or insecure protocol, but lack of support is the more pressing issue.
upvoted 1 times
...
...
PiotrG
2 years, 7 months ago
Selected Answer: C
because i am king piotr
upvoted 2 times
...
db97
2 years, 7 months ago
I think "lack of Vendor Support" is the reason but not the risk and also I wouldn't discard "Weak Encryption" as a potential risk due to if it is a web server for example, they could still use a "secure protocol" by setting up HTTPS but the encryption might be under SSL 1.0/2.0/3.0 and not even TLS and that would be real risk. These are just my thoughts, I'm open to discuss it.
upvoted 1 times
...
Boats
2 years, 7 months ago
Selected Answer: C
Having used legacy software, I would go with C. We don't have enough information to go with anything else. We only know that it is potentially unsupported.
upvoted 2 times
...
Joe1984
2 years, 8 months ago
I believe it is Unsecure protocols. It basically saying, its old, there is no vendor support, what is the result = unsecure protocols
upvoted 2 times
...
[Removed]
2 years, 8 months ago
Selected Answer: C
Fact this is a legacy system it doesn't mean it uses default credentails, weak encryption or unsecure protocols. Hence only answer may be "Lack of vendor support"
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago