A recent internal audit is forcing a company to review each internal business unit's VMs because the cluster they are installed on is in danger of running out of computer resources.
Which of the following vulnerabilities exists?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
The vulnerability that exists in this scenario is C. System sprawl.
System sprawl refers to the practice of deploying too many systems, applications, or services than are necessary. This often happens in large organizations with multiple business units, each deploying their own systems and applications to meet their specific needs without proper coordination with other units. System sprawl can lead to inefficient use of resources and increased security risks as it becomes difficult to manage and secure all the systems and applications.
In this scenario, the company is reviewing each internal business unit's virtual machines (VMs) because the cluster they are installed on is in danger of running out of computer resources. This indicates that the company has likely deployed too many VMs without proper coordination, leading to system sprawl.
Buffer overflow refers to a type of vulnerability that occurs when a program tries to store more data in a buffer than it can hold, leading to the corruption of adjacent memory locations. End-of-life systems refer to systems that are no longer supported by their vendor, making them vulnerable to known security flaws that will not be fixed. Weak configuration refers to poor configuration practices that can leave systems vulnerable to attacks.
Therefore, the correct answer is C. System sprawl.