1D Flashcards

1
Q

A ___ ___ consists of multiple entities, such as governments, corporations, or small businesses, coordinating to get a product or products to a destination.

A

supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ___ ___ in a supply chain is an intermediary, subcontracted individual, or company that provides a product or a service in support of the primary objectives of an organization.

A

third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third party support services can vary widely from janitorial services to software engineering, and more. Granting either ___ or ___
access to an organization’s information system, software code, or intellectual property can leave these assets vulnerable to exploitation through malicious actions or carelessness.

A

physical or virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ ___ ___ refers to efforts to enhance the security of the supply chain, the transport and logistics system for the cargo.

A

Supply chain security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supply chain security combines traditional practices of supply-chain management with the security requirements driven by threats such as ___, ____ and ____.

A

terrorism, piracy and theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Typical supply-chain security activities include:

A
  • Credentialing of participants in the supply chain.
  • Screening and validating of the contents of cargo being shipped.
  • Advance notification of the contents to the destination.
  • Ensuring the security of cargo while in-transit via the use of locks and tamper-proof seals.
  • Inspecting cargo on entry.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ ___ is a powerful business solution because it allows an organization to save on hardware and management costs while maintaining high availability.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

However, cloud computing often relies on a ___ ___ to handle your data, which could include sensitive information. Ensuring the third party is securing this data is an important prerequisite when considering moving in-house services off-site and putting them into the hands of a third party.

A

third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly