Question 1
What aspect of software updates must be verified to avoid supply chain attacks?
Question 2
What action did the DHS take in response to counterfeit Cisco products entering the supply chain?
Question 3
What is a significant threat posed by counterfeit hardware like firewalls and routers?
Question 4
What is a crucial measure in dealing with outdated or unauthorized equipment from suppliers?
Question 5
What type of supply chain breach involves hidden manipulations in the system's lifecycle?
Question 6
In the SolarWinds Orion breach, how did attackers gain access to many organizations' systems?
Question 7
What is a crucial practice to mitigate risks from third-party service providers?
Question 8
From where did the counterfeit products involved in the DHS case originate?
Question 9
What environment should be carefully managed to avoid malware injection, as highlighted by the SolarWinds incident?
Question 10
Why might open source software present a supply chain security risk?
Question 11
What is a major security concern at each step of the supply chain?
Question 12
Which organization suffered a breach because of a third-party HVAC provider?
Question 13
What is a common issue when trusting new suppliers?
Question 14
Why is outsourcing potentially risky in terms of supply chain security?
Question 15
What was a key vulnerability in the Target Corporation breach?
Question 16
What risk is associated with non-IT service providers accessing company networks?