Which of the following is the most common risk associated with maintaining legacy systems?
Think about how old software might not receive updates or patches.
Legacy systems often use outdated software components that no longer receive security updates, making them vulnerable to attacks.
A company wants to update its legacy system without disrupting current operations. Which modernization approach best fits this goal?
Consider approaches that allow old and new systems to work together.
Encapsulation wraps legacy components with APIs, enabling gradual modernization without disrupting existing operations.
What is a likely consequence of refactoring legacy code to improve modularity?
Think about what happens when you change old code.
Refactoring legacy code can introduce new bugs because the code is changed, even though it improves modularity and maintainability.
Which statement correctly compares 'rehosting' and 'refactoring' in legacy system modernization?
Focus on what each technique changes: code or infrastructure.
Rehosting moves legacy systems to new infrastructure with minimal code changes, while refactoring changes the code to improve its design and maintainability.
A legacy system modernization project used a 'strangler pattern' to gradually replace old components. After completion, what is the expected state of the system?
Consider how the strangler pattern replaces parts step-by-step.
The strangler pattern gradually replaces legacy components with new ones, allowing the system to be fully modernized without downtime.