A cyber technician works on a corporate laptop where an employee complains the software is outdated. What type of vulnerability describes the continued use of outdated software methods, technology, computer systems, or application programs despite known shortcomings?
A. Legacy
B. Firmware
C. Virtualization
D. End-of-life