A security assessment found that several embedded systems are running unsecure protocols. These systems were purchased two years ago, and the company that developed them is no longer in business. Which of the following constraints best describes the reason the findings cannot be remediated? A. Inability to authenticate B. Implied trust C. Lack of computing power D. Unavailable patch  Correct Answer: D This question is in SY0-601 exam For getting CompTIA Security+ certificate
Please login or Register to submit your answer