A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?
A thorough analysis of the supply chain.
Conducting a thorough analysis of the supply chain allows companies to identify potential vulnerabilities and ensure that all components, including hardware, are sourced from reputable and certified suppliers. This proactive approach mitigates the risk of counterfeit hardware entering the network, safeguarding the integrity and security of the infrastructure.
This choice is the best option as it directly addresses the risks of counterfeit hardware by evaluating every stage of the supply chain. A comprehensive analysis helps in identifying untrustworthy suppliers and ensuring that all hardware components are legitimate and certified, thus significantly reducing the chances of counterfeiting.
While a legally enforceable acquisition policy can help establish guidelines for procurement, it does not actively address the risks associated with counterfeit hardware. Without the implementation of a supply chain analysis, such a policy may not effectively prevent counterfeit products from being acquired, as it lacks the detailed oversight necessary to verify supplier authenticity.
Though a right to audit clause can provide some level of oversight, it is reactive rather than proactive. Auditing vendors after they have been engaged does not prevent counterfeit hardware from being supplied initially. This approach relies on post-purchase verification, which might still allow counterfeit items to cause issues before detection occurs.
In-depth penetration tests focus on the security of systems rather than the authenticity of hardware products. While important for cybersecurity, this option does not directly address the procurement of counterfeit hardware. It assesses vulnerabilities within existing systems rather than ensuring that the hardware being used is legitimate and certified.
To mitigate the risks associated with counterfeit hardware, a thorough analysis of the supply chain is essential. This comprehensive approach enables organizations to identify potential threats at the sourcing stage, ensuring that only certified hardware is procured. Other options, while valuable in their own right, do not provide the same level of proactive risk management necessary to prevent counterfeit hardware from entering a network.
Related Questions
View allPrior to implementing a design change, the change must go through mult...
A security officer observes that a software development team is not co...
Which of the following attacks is being attempted?
A government worker secretly copies classified files that contain defe...
A security manager wants to reduce the number of steps required to ide...
Related Quizzes
View allCompTIA A Plus Certification Exam
CompTIA A Plus Exam Questions
CompTIA A Plus 1001 Exams Practice
CompTIA A Plus Practice Exam
CompTIA CySA+ Cybersecurity Analyst Certification all in One Exam Guide
CompTIA Network Plus Certification Exam Quiz
Free CompTIA Security Plus Practice Test
CompTIA Security Plus Simulation Questions
CompTIA Security Plus 501 Practice Questions
CompTIA Security Plus Example Questions
- ✓ 500+ Practice Questions
- ✓ Detailed Explanations
- ✓ Progress Analytics
- ✓ Exam Simulations