ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 208 - SY0-701 discussion

Report
Export

A security administrator identifies an application that is storing data using MD5. Which of the following best identifies the vulnerability likely present in the application?

A.
Cryptographic
Answers
A.
Cryptographic
B.
Malicious update
Answers
B.
Malicious update
C.
Zero day
Answers
C.
Zero day
D.
Side loading
Answers
D.
Side loading
Suggested answer: A

Explanation:

The vulnerability likely present in the application that is storing data using MD5 is a cryptographic vulnerability. MD5 is considered to be a weak hashing algorithm due to its susceptibility to collision attacks, where two different inputs produce the same hash output, compromising data integrity and security.

Cryptographic: Refers to vulnerabilities in cryptographic algorithms or implementations, such as the weaknesses in MD5.

Malicious update: Refers to the intentional injection of harmful updates, not related to the use of MD5.

Zero day: Refers to previously unknown vulnerabilities for which no patch is available, not specifically related to MD5.

Side loading: Involves installing software from unofficial sources, not directly related to the use of MD5.

asked 02/10/2024
Nicos Chamberlain
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first