Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What issue can arise from using poorly configured hardware or software from third-party suppliers?

  1. Supply-Chain Risks

  2. Vendor Lock-In

  3. Third-Party Breaches

  4. Outdated Resources

The correct answer is: Supply-Chain Risks

The issue that arises from using poorly configured hardware or software from third-party suppliers is primarily categorized as supply-chain risks. This concept encompasses the vulnerabilities that can be introduced into a company's environment due to the integration of external products and services that may not meet security standards. When third-party suppliers do not adequately configure their systems or applications, it opens the door for various threats, such as cyberattacks, data breaches, or disruptions in service. These vulnerabilities can be exploited by malicious actors to gain unauthorized access to sensitive data or compromise the integrity of systems. In various industries, the reliance on third-party technology means that businesses are not only responsible for their own security but also need to evaluate and manage the risks associated with external entities. Poor configurations can lead to weaknesses that affect entire supply chains, impacting not just the immediate organization but also its customers and partners. Therefore, ensuring that third-party products are properly configured and monitored is crucial to mitigate potential supply-chain risks.