Search Header Logo

036_Supply Chain Vulnerabilities – CompTIA Security+

Authored by Wayground Content

Computers

9th - 12th Grade

Used 2+ times

036_Supply Chain Vulnerabilities – CompTIA Security+
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key takeaway for supply chain security?

Trust must be earned and verified

Trust is irrelevant in supply chain security

Trust can be assumed without verification

Trust is only needed for internal stakeholders

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the supply chain include?

All steps from raw materials to product delivery

Only the manufacturing process

Transportation of finished goods only

Retail and customer service operations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hardware supply chain risk?

New devices may have preloaded vulnerabilities

Hardware components can be easily replicated

Supply chain disruptions can lead to increased costs

All hardware is immune to cyber threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attackers first breach Target in 2013?

Through a phishing attack on an HVAC vendor

By exploiting a vulnerability in the payment system

Using stolen credit card information from customers

Through a DDoS attack on the website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attackers distribute malware in the SolarWinds breach?

By injecting it into software updates

Through phishing emails

By exploiting zero-day vulnerabilities

Using removable media devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can happen if a third-party IT service is compromised?

Sensitive data may be exposed.

Service downtime may occur.

User accounts may be locked.

Software updates may be delayed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware was used in the Target breach?

Register-based malware for stealing card data

Ransomware for encrypting files

Spyware for tracking user activity

Adware for displaying unwanted ads

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?