The correct answer is 'Compromised hardware or software' because suppliers have direct access to the components and programs that enterprises use, making it possible for them to introduce compromised products into an organization's infrastructure. 'Data corruption during transmission' focuses on data in transit rather than supply chain vulnerabilities. 'Inadequate customer service' does not directly relate to security issues, and 'Unauthorized data sharing' is a concern with entities that handle data, but it does not specifically relate to the unique risks posed by suppliers of hardware and software in the supply chain.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are supply chain attacks in cybersecurity?
Open an interactive chat with Bash
How can organizations mitigate risks associated with compromised hardware or software?
Open an interactive chat with Bash
What is the difference between data corruption during transmission and supply chain risks?