ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 194 - SY0-601 discussion

Report
Export

An attacker replaces a digitally signed document with another version that goes unnoticed Upon reviewing the document's contents the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?

A.
Cryptomalware
Answers
A.
Cryptomalware
B.
Hash substitution
Answers
B.
Hash substitution
C.
Collision
Answers
C.
Collision
D.
Phishing
Answers
D.
Phishing
Suggested answer: B

Explanation:

This type of attack occurs when an attacker replaces a digitally signed document with another version that has a different hash value. The author would be able to notice the additional verbiage, however, since the hash value would have changed, they would not be able to validate an integrity issue.

asked 02/10/2024
Musoke Kamuzze
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first