CompTIA Security+ SY0-701 Practice Question
Which attack is an example of exploiting hash function vulnerabilities by finding two different inputs that yield the same output?
Known plaintext attack
Collision attack
Birthday attack
Man-in-the-middle attack