A multinational manufacturing company discovers that a batch of network routers purchased from a longstanding supplier contains unauthorized hardware components not in the original design. Which of these supply chain risks does this scenario most directly represent?
The correct answer is Product tampering, as the scenario describes a situation where legitimate products (network routers) from an established supplier have been altered by the addition of unauthorized hardware components that weren't part of the original design specifications.
Product tampering specifically refers to the unauthorized modification of a product somewhere in the supply chain before it reaches the end user. In this case, the network routers were tampered with by adding unauthorized hardware components.
Counterfeiting is incorrect because the scenario doesn't indicate the routers are fake or imitation products pretending to be genuine - they are actual products from the legitimate supplier that have been modified.
Third-party compromise is too broad and general - while it could encompass tampering, the specific risk described is more precisely defined as product tampering. There is not a specific indication that the third-party did not deliberately include the unauthorized hardware components.
Poor quality control suggests unintentional manufacturing defects rather than deliberate insertion of unauthorized components, which is what product tampering entails.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common examples of product tampering?
Open an interactive chat with Bash
How can companies mitigate the risks of product tampering in their supply chains?
Open an interactive chat with Bash
What regulatory standards exist to prevent product tampering?
Open an interactive chat with Bash
ISC2 CISSP
Security and Risk Management
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access