Quiz for:
Supply Chain Vulnerabilities

Question 1

What aspect of software updates must be verified to avoid supply chain attacks?

Question 2

What action did the DHS take in response to counterfeit Cisco products entering the supply chain?

Question 3

What is a significant threat posed by counterfeit hardware like firewalls and routers?

Question 4

What is a crucial measure in dealing with outdated or unauthorized equipment from suppliers?

Question 5

What type of supply chain breach involves hidden manipulations in the system's lifecycle?

Question 6

In the SolarWinds Orion breach, how did attackers gain access to many organizations' systems?

Question 7

What is a crucial practice to mitigate risks from third-party service providers?

Question 8

From where did the counterfeit products involved in the DHS case originate?

Question 9

What environment should be carefully managed to avoid malware injection, as highlighted by the SolarWinds incident?

Question 10

Why might open source software present a supply chain security risk?

Question 11

What is a major security concern at each step of the supply chain?

Question 12

Which organization suffered a breach because of a third-party HVAC provider?

Question 13

What is a common issue when trusting new suppliers?

Question 14

Why is outsourcing potentially risky in terms of supply chain security?

Question 15

What was a key vulnerability in the Target Corporation breach?

Question 16

What risk is associated with non-IT service providers accessing company networks?