036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Communication Technologies

Communication Technologies

10th Grade

18 Qs

As/A Level  CS 9Chpt_6: Security, Privacy, and Integrity of Data

As/A Level CS 9Chpt_6: Security, Privacy, and Integrity of Data

11th Grade

15 Qs

Eduqas Computer Science 1.5 Operating Systems

Eduqas Computer Science 1.5 Operating Systems

9th - 11th Grade

20 Qs

Chapter 5 & 6 Review

Chapter 5 & 6 Review

9th - 12th Grade

23 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

Satellite and Network

Satellite and Network

12th Grade

15 Qs

Computer and Network Security

Computer and Network Security

10th Grade

20 Qs

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

029_Malicious Updates – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key takeaway for supply chain security?

Trust must be earned and verified

Trust is irrelevant in supply chain security

Trust can be assumed without verification

Trust is only needed for internal stakeholders

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the supply chain include?

All steps from raw materials to product delivery

Only the manufacturing process

Transportation of finished goods only

Retail and customer service operations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hardware supply chain risk?

New devices may have preloaded vulnerabilities

Hardware components can be easily replicated

Supply chain disruptions can lead to increased costs

All hardware is immune to cyber threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attackers first breach Target in 2013?

Through a phishing attack on an HVAC vendor

By exploiting a vulnerability in the payment system

Using stolen credit card information from customers

Through a DDoS attack on the website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attackers distribute malware in the SolarWinds breach?

By injecting it into software updates

Through phishing emails

By exploiting zero-day vulnerabilities

Using removable media devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can happen if a third-party IT service is compromised?

Sensitive data may be exposed.

Service downtime may occur.

User accounts may be locked.

Software updates may be delayed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware was used in the Target breach?

Register-based malware for stealing card data

Ransomware for encrypting files

Spyware for tracking user activity

Adware for displaying unwanted ads

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?