0
0
Cybersecurityknowledge~20 mins

Supply chain security in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Supply Chain Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
What is the primary goal of supply chain security?

Choose the option that best describes the main purpose of supply chain security in cybersecurity.

ATo ensure that all software and hardware components come from trusted sources and have not been tampered with.
BTo speed up the delivery of products by reducing inspection times.
CTo increase the number of suppliers to reduce costs.
DTo focus only on physical security of warehouses and shipping centers.
Attempts:
2 left
💡 Hint

Think about what risks supply chain security tries to prevent.

📋 Factual
intermediate
2:00remaining
Which of these is a common risk in supply chain security?

Select the risk that is most commonly associated with supply chain security breaches.

APhishing attacks targeting end users.
BInsertion of malicious code into software updates.
CPhysical theft of office computers.
DDenial of service attacks on company websites.
Attempts:
2 left
💡 Hint

Consider risks that happen during software or hardware delivery.

🔍 Analysis
advanced
2:00remaining
Analyzing a supply chain attack scenario

A company receives a software update from a trusted vendor. Later, it is discovered the update contained hidden malware. What is the most likely supply chain security failure?

AThe vendor's physical warehouse was broken into.
BThe company did not have a firewall installed.
CThe company failed to verify the digital signature of the update.
DThe company used outdated antivirus software.
Attempts:
2 left
💡 Hint

Think about how software authenticity is usually confirmed.

Comparison
advanced
2:00remaining
Comparing supply chain security controls

Which control is more effective at preventing hardware tampering during manufacturing?

AUsing tamper-evident seals on hardware packaging.
BInstalling antivirus software on end-user devices.
CEncrypting data in transit over the internet.
DConducting phishing awareness training for employees.
Attempts:
2 left
💡 Hint

Focus on physical protection methods for hardware.

Reasoning
expert
3:00remaining
Reasoning about supply chain attack detection

A company uses multiple third-party software libraries. Which approach best helps detect if one library has been compromised?

AAllowing unrestricted internet access for all employees.
BOnly updating libraries once every two years to reduce change.
CDisabling all logging to improve performance.
DRegularly verifying cryptographic hashes of the libraries against trusted sources.
Attempts:
2 left
💡 Hint

Think about how to confirm software integrity over time.