exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 721 discussion

Actual exam question from Isaca's CISM
Question #: 721
Topic #: 1
[All CISM Questions]

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

  • A. Unreliable delivery of hardware and software resources by a supplier
  • B. Unavailability of services provided by a supplier
  • C. Loss of customers due to unavailability of products
  • D. Compromise of critical assets via third-party resources
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 5 months ago
Selected Answer: D
A supply chain attack is a type of cyber attack in which the attacker targets an organization by compromising its suppliers or third-party resources that are part of the organization's supply chain. By infiltrating these third-party resources, an attacker can gain access to sensitive information, install malware, or compromise critical assets that would otherwise be secure. This type of attack can result in significant consequences for an organization, including data breaches, reputational damage, legal liability, and business disruption. As such, the most likely risk scenario to emerge from a supply chain attack is the compromise of critical assets, which can have a significant impact on an organization's operations, security, and reputation.
upvoted 7 times
...
wickhaarry
Most Recent 11 months, 3 weeks ago
D Supply chain attacks are evolving threats that target third-party software suppliers. A software supply chain attack occurs when a cyber threat actor compromises the software before the supplier sends it to their customers. One successful intrusion can have a ripple effect and can potentially impact thousands of victims.
upvoted 1 times
...
richck102
1 year ago
D. Compromise of critical assets via third-party resources
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...