Free CompTIA Security+ SY0-701 Practice Question

Which attack is an example of exploiting hash function vulnerabilities by finding two different inputs that yield the same output?

  • Birthday attack

  • Man-in-the-middle attack

  • Known plaintext attack

  • Collision attack

This question's topic:
CompTIA Security+ SY0-701 / 
Threats, Vulnerabilities, and Mitigations
Your Score:

Check or uncheck an objective to set which questions you will receive.