exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 593 discussion

Actual exam question from CompTIA's SY0-701
Question #: 593
Topic #: 1
[All SY0-701 Questions]

Which of the following is a type of vulnerability that may result from outdated algorithms or keys?

  • A. Hash collision
  • B. Cryptographic
  • C. Buffer overflow
  • D. Input validation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Gill8024
3 weeks, 2 days ago
Selected Answer: B
Outdated cryptographic algorithms (e.g., DES, MD5 for security purposes) and weak or compromised keys directly lead to cryptographic vulnerabilities. These vulnerabilities make it possible for attackers to break encryption, forge digital signatures, or otherwise undermine the security properties (confidentiality, integrity, authenticity) that cryptography is supposed to provide.
upvoted 2 times
...
74cd09c
3 weeks, 4 days ago
Selected Answer: B
Hash collision. i.e. MD5. SHA1, etc
upvoted 1 times
...
21bc1a0
2 months ago
Selected Answer: B
Outdated cryptographic algorithms or keys can lead to a variety of vulnerabilities, as they may not be able to withstand modern attacks or provide sufficient encryption strength. This is a broad category encompassing vulnerabilities like weak encryption, outdated ciphers, or insecure key management practices
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...