Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following OWASP IoT threats can emerge via compromised supply chain components?

  1. Use of insecure or outdated components

  2. Unauthorized access to data

  3. Malicious firmware attacks

  4. Data traffic interception

The correct answer is: Use of insecure or outdated components

The selection of the threat associated with compromised supply chain components being the use of insecure or outdated components is well-founded. In the context of the Internet of Things (IoT), the supply chain includes every step in the production and distribution of hardware and software components used in devices. When the supply chain is compromised, it can lead to the introduction of components that have known vulnerabilities or are outdated, which makes them susceptible to exploitation. Attackers can insert insecure components into the production process, or vendors might use outdated libraries and frameworks that haven't been maintained or patched. This vulnerability can form the basis for larger security issues, as these weak points can be exploited to gain access to the device or the data it handles. By ensuring that every component is secure and up-to-date through the supply chain, organizations can significantly reduce the risk of such vulnerabilities being exploited. This highlights the critical nature of securing the supply chain in the implementation of IoT systems, as insecure or outdated components can serve as an entry point for attackers, potentially leading to more severe security breaches.