CompTIA Security+ SY0-701 Practice Question
A network administrator is concerned that an attacker might exploit a hash algorithm's vulnerability by finding two different inputs that produce the same hash output, compromising data integrity. Which cryptographic attack leverages this probability?
Dictionary attack
Brute force attack
Rainbow table attack
Birthday attack