ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 143 - CS0-003 discussion

Report
Export

A security analyst is reviewing the findings of the latest vulnerability report for a company's web application. The web application accepts files for a Bash script to be processed if the files match a given hash. The analyst is able to submit files to the system due to a hash collision. Which of the following should the analyst suggest to mitigate the vulnerability with the fewest changes to the current script and infrastructure?

A.
Deploy a WAF to the front of the application.
Answers
A.
Deploy a WAF to the front of the application.
B.
Replace the current MD5 with SHA-256.
Answers
B.
Replace the current MD5 with SHA-256.
C.
Deploy an antivirus application on the hosting system.
Answers
C.
Deploy an antivirus application on the hosting system.
D.
Replace the MD5 with digital signatures.
Answers
D.
Replace the MD5 with digital signatures.
Suggested answer: B

Explanation:

The correct answer is B. Replace the current MD5 with SHA-256.

The vulnerability that the security analyst is able to exploit is a hash collision, which is a situation where two different files produce the same hash value. Hash collisions can allow an attacker to bypass the integrity or authentication checks that rely on hash values, and submit malicious files to the system. The web application uses MD5, which is a hashing algorithm that is known to be vulnerable to hash collisions. Therefore, the analyst should suggest replacing the current MD5 with SHA-256, which is a more secure and collision-resistant hashing algorithm.

The other options are not the best suggestions to mitigate the vulnerability with the fewest changes to the current script and infrastructure. Deploying a WAF (web application firewall) to the front of the application (A) may help protect the web application from some common attacks, but it may not prevent hash collisions or detect malicious files. Deploying an antivirus application on the hosting system © may help scan and remove malicious files from the system, but it may not prevent hash collisions or block malicious files from being submitted. Replacing the MD5 with digital signatures (D) may help verify the authenticity and integrity of the files, but it may require significant changes to

the current script and infrastructure, as digital signatures involve public-key cryptography and certificate authorities.

asked 02/10/2024
Ioana Mihaila
21 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first