Exam4Training

Which of the following best addresses the risks associated with procuring counterfeit hardware?

A company is required to use certified hardware when building networks.

Which of the following best addresses the risks associated with procuring counterfeit hardware?
A . A thorough analysis of the supply chain
B . A legally enforceable corporate acquisition policy
C . A right to audit clause in vendor contracts and SOWs
D . An in-depth penetration test of all suppliers and vendors

Answer: A

Explanation:

Counterfeit hardware is hardware that is built or modified without the authorization of the original equipment manufacturer (OEM). It can pose serious risks to network quality, performance, safety, and reliability12. Counterfeit hardware can also contain malicious components that can compromise the security of the network and the data that flows through it3. To address the risks associated with procuring counterfeit hardware, a company should conduct a thorough analysis of the supply chain, which is the network of entities involved in the production, distribution, and delivery of the hardware. By analyzing the supply chain, the company can verify the origin, authenticity, and integrity of the hardware, and identify any potential sources of counterfeit or tampered products. A thorough analysis of the supply chain can include the following steps: Establishing a trusted relationship with the OEM and authorized resellers

Requesting documentation and certification of the hardware from the OEM or authorized resellers Inspecting the hardware for any signs of tampering, such as mismatched labels, serial numbers, or components

Testing the hardware for functionality, performance, and security

Implementing a tracking system to monitor the hardware throughout its lifecycle

Reporting any suspicious or counterfeit hardware to the OEM and law enforcement

agencies Reference = 1: Identify Counterfeit and Pirated Products – Cisco, 2: What Is Hardware

Security? Definition, Threats, and Best Practices, 3: Beware of Counterfeit Network Equipment –

TechNewsWorld: Counterfeit Hardware: The Threat and How to Avoid It

Latest SY0-701 Dumps Valid Version with 77 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version