CompTIA Security+ SY0-701 Practice Question
During a routine security audit, the auditor discovers that two different archived log files generate the same hash value despite having different contents. Which of the following type of attack might have occurred?
Key exchange method
Hashing algorithm speed
Collision attack
Password entropy