exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 310 discussion

Actual exam question from CompTIA's SY0-601
Question #: 310
Topic #: 1
[All SY0-601 Questions]

An attacker replaces a digitally signed document with another version that goes unnoticed. Upon reviewing the document’s contents, the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?

  • A. Cryptomalware
  • B. Hash substitution
  • C. Collision
  • D. Phishing
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mvckenzi
Highly Voted 2 years, 2 months ago
Selected Answer: C
It's a cryptographic attack. The content is different, but the hashes match which is why the integrity check can't be validated. From Professor Messer: In a birthday attack, attacker will generate multiple versions of plaintext to match the hashes.
upvoted 18 times
...
ApplebeesWaiter1122
Highly Voted 1 year, 11 months ago
Selected Answer: C
A collision attack involves finding two different inputs that produce the same hash value. In the context of this question, the attacker has likely found a way to generate a modified document that produces the same hash value as the original document, allowing them to replace the original document with the modified version without invalidating the digital signature. This manipulation goes unnoticed since the modified document appears to have the same integrity as the original, but with additional verbiage added. It's important to note that collision attacks are rare and usually require significant computational resources and expertise to execute successfully. However, when they occur, they can undermine the integrity and trustworthiness of digital signatures and cryptographic systems.
upvoted 17 times
...
Jayysaystgis
Most Recent 5 months ago
Google Says "Hash substitution is a malicious action that involves replacing the contents of a file with altered or malicious content while keeping the same hash value. This can allow an attacker to modify a document without invalidating the digital signature, which is often based on the hash of the signed content" I say its B
upvoted 1 times
...
Marleigh
11 months, 2 weeks ago
Selected Answer: C
I would say B. Hash substitution because collision is "a random match in hash values that occurs when a hashing algorithm produces the same hash value for two distinct pieces of data." ACTUALLY, after researching some more to make my argument for hash substitution, I really couldn't find much. Everything points to hash collision. In fact, the only place that myself or Google's Gemini could find mentioning Hash substitution was this site. So while I don't particularly agree with collision, I cannot truly verify what hash substitution really is... idk I just hope I dont get this question on my exam lol
upvoted 1 times
...
Fart2023
1 year ago
Selected Answer: B
B or C, this is a terrible question.
upvoted 1 times
...
bknum9
1 year, 2 months ago
Selected Answer: B
Based on the author not being able to validate an integrity issue. I would go with hash substitution. If he was able to validate integrity and there are still changes to document then we can say that the two hashes are the same thus collision
upvoted 2 times
...
kewokil120
1 year, 2 months ago
Selected Answer: C
No hashing at play. Other dont make sense. So it C
upvoted 1 times
...
alicia2024
1 year, 2 months ago
Selected Answer: B
Hash substitution involves replacing the original content of a file with malicious or altered content while maintaining the same hash value. Since digital signatures are often based on hashes of the signed content, if an attacker can substitute the document with a different version that has the same hash value, the digital signature may still appear valid. This allows the attacker to modify the document without invalidating the digital signature, potentially leading to unauthorized changes going unnoticed.
upvoted 1 times
...
shaneo007
1 year, 3 months ago
Answer B. Hash substitution.
upvoted 2 times
...
AceVander
1 year, 4 months ago
B. Hash Substitution While Hash "Collisions" can happen by accident when an attacker is able to find an input that produces the same hash value (checksum) to produce an entirely different file or document would cause an Integrity issue because than there would be two separate files with the same hash value. The question says the author was not able to validate an integrity issue which mean it is a modified document that was substituted with the same hash. This allows it to go unnoticed and without any integrity issues.
upvoted 2 times
...
Cloudninja117
1 year, 5 months ago
Selected Answer: B
B is correct not c it’s in the Jason dion questions and the mike meters questions.
upvoted 4 times
...
Teleco0997
1 year, 5 months ago
Selected Answer: C
"Hash substitution" is NOT a recognized term in the context of cybersecurity or cryptographic attacks
upvoted 4 times
Jayysaystgis
5 months ago
Google Ai says. Hash substitution is a malicious action that involves replacing the contents of a file with altered or malicious content while keeping the same hash value. This can allow an attacker to modify a document without invalidating the digital signature, which is often based on the hash of the signed content.
upvoted 1 times
...
...
PropheticBettor
1 year, 6 months ago
No such thing as collision attack
upvoted 1 times
...
_Bihari_
1 year, 6 months ago
Selected Answer: B
B. Hash substitution: The described scenario is consistent with a hash substitution attack. In this type of attack, an attacker replaces a file with a different version that has the same hash value as the original. Since digital signatures are often based on the hash of the document, if the hash remains unchanged, the digital signature may still appear valid. Collision: A collision in the context of hash functions occurs when two different inputs produce the same hash output. Collisions can happen unintentionally due to the nature of hash functions, but they are not created with a specific malicious intent. Cryptographic hash functions are designed to minimize the likelihood of collisions. Hash Substitution: Hash substitution, on the other hand, is typically a deliberate and malicious act. It involves replacing a file with a different version that has the same hash value as the original. This can be done with the intention of evading detection, especially in scenarios where digital signatures or integrity checks are based on the hash value.
upvoted 3 times
...
Soleandheel
1 year, 6 months ago
Hash Substitution is the correct answer. B. Hash substitution In a hash substitution attack, an attacker modifies the content of a file while keeping the same hash value (checksum). This allows them to replace a legitimate file with a malicious or modified version without changing the hash value, making it appear as if the file has not been tampered with. In the given scenario, the attacker replaced a digitally signed document with another version that went unnoticed by the author, indicating a hash substitution attack where the hash value remained the same despite the content alteration. As such, B is the right choice.
upvoted 1 times
...
ComPCertOn
1 year, 6 months ago
Selected Answer: B
I strongly believe it is B hash sub. And there is no mention of the “hash remained the same”! One more thing, never make assumptions with Comptia.
upvoted 1 times
...
PropheticBettor
1 year, 6 months ago
Hash substitution since the attacker replaces the original file with a fake. For nonrepudiation purposes it's common to create a unique hash like for the chain of custody. Since we know a fake was used in place of the original, we know the hash must have been substituted
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago