036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

QUIZ #3 LESSON 6: PEER-TO-PEER NETWORK & NETWORK SECURITY

QUIZ #3 LESSON 6: PEER-TO-PEER NETWORK & NETWORK SECURITY

10th Grade

20 Qs

Quiz - AIJ | SMKM3

Quiz - AIJ | SMKM3

12th Grade - University

20 Qs

A1 Threat Types

A1 Threat Types

12th Grade

15 Qs

R050 Hardware and Software

R050 Hardware and Software

10th Grade

22 Qs

Input/Output Devices & CPU

Input/Output Devices & CPU

9th Grade

20 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

BTEC L3 IT - information systems

BTEC L3 IT - information systems

12th Grade

20 Qs

DAR Intro to Computers

DAR Intro to Computers

9th - 12th Grade

15 Qs

036_Supply Chain Vulnerabilities – CompTIA Security+

036_Supply Chain Vulnerabilities – CompTIA Security+

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key takeaway for supply chain security?

Trust must be earned and verified

Trust is irrelevant in supply chain security

Trust can be assumed without verification

Trust is only needed for internal stakeholders

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the supply chain include?

All steps from raw materials to product delivery

Only the manufacturing process

Transportation of finished goods only

Retail and customer service operations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hardware supply chain risk?

New devices may have preloaded vulnerabilities

Hardware components can be easily replicated

Supply chain disruptions can lead to increased costs

All hardware is immune to cyber threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attackers first breach Target in 2013?

Through a phishing attack on an HVAC vendor

By exploiting a vulnerability in the payment system

Using stolen credit card information from customers

Through a DDoS attack on the website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attackers distribute malware in the SolarWinds breach?

By injecting it into software updates

Through phishing emails

By exploiting zero-day vulnerabilities

Using removable media devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can happen if a third-party IT service is compromised?

Sensitive data may be exposed.

Service downtime may occur.

User accounts may be locked.

Software updates may be delayed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware was used in the Target breach?

Register-based malware for stealing card data

Ransomware for encrypting files

Spyware for tracking user activity

Adware for displaying unwanted ads

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?