Which of the following methods would most likely be used to identify legacy systems?
Correct Answer: B
A vulnerability scan is the most likely method to identify legacy systems. These scans assess an organization's network and systems for known vulnerabilities, including outdated or unsupported software (i.
e., legacy systems) that may pose a security risk. The scan results can highlight systems that are no longer receiving updates, helping IT teams address these risks.
* Bug bounty programs are used to incentivize external researchers to find security flaws, but they are less effective at identifying legacy systems.
* Package monitoring tracks installed software packages for updates or issues but is not as comprehensive for identifying legacy systems.
* Dynamic analysis is typically used for testing applications during runtime to find vulnerabilities, but not for identifying legacy systems.