ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 31 - SY0-701 discussion

Report
Export

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?

A.
A thorough analysis of the supply chain
Answers
A.
A thorough analysis of the supply chain
B.
A legally enforceable corporate acquisition policy
Answers
B.
A legally enforceable corporate acquisition policy
C.
A right to audit clause in vendor contracts and SOWs
Answers
C.
A right to audit clause in vendor contracts and SOWs
D.
An in-depth penetration test of all suppliers and vendors
Answers
D.
An in-depth penetration test of all suppliers and vendors
Suggested answer: A

Explanation:

Counterfeit hardware is hardware that is built or modified without the authorization of the original equipment manufacturer (OEM).It can pose serious risks to network quality, performance, safety, and reliability12.Counterfeit hardware can also contain malicious components that can compromise the security of the network and the data that flows through it3. To address the risks associated with procuring counterfeit hardware, a company should conduct a thorough analysis of the supply chain, which is the network of entities involved in the production, distribution, and delivery of the hardware. By analyzing the supply chain, the company can verify the origin, authenticity, and integrity of the hardware, and identify any potential sources of counterfeit or tampered products. A thorough analysis of the supply chain can include the following steps:

Establishing a trusted relationship with the OEM and authorized resellers

Requesting documentation and certification of the hardware from the OEM or authorized resellers

Inspecting the hardware for any signs of tampering, such as mismatched labels, serial numbers, or components

Testing the hardware for functionality, performance, and security

Implementing a tracking system to monitor the hardware throughout its lifecycle

Reporting any suspicious or counterfeit hardware to the OEM and law enforcement agenciesReference=1:Identify Counterfeit and Pirated Products - Cisco,2:What Is Hardware Security? Definition, Threats, and Best Practices,3:Beware of Counterfeit Network Equipment - TechNewsWorld, : Counterfeit Hardware: The Threat and How to Avoid It

asked 02/10/2024
Babatunde Ipaye
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first