CERTIVIEW

Wednesday, 19 October 2016

Security+ Question of the Week: Risk of Collision

SecurityQOW03Which of the following has the highest risk of collision?

A. SHA‐1
B. HMAC
C. MD5
D. SHA‐2

Reveal Answer

The correct answer is C.

The highest risk of collision is based on the shorted hash value output length. From this list of MD5 has the shortest with 128 bit hash value length. SHA-1 has 160 bit hash value length, and SHA-2 has hash value length starting as 224 increasing from there. HMAC is not a hashing algorithm, instead it is an implementation of hashing. HMAC can use any hashing algorithm, such as MD5 or SHA-1, then adds the use of a symmetric key as a randomness source in order to produce a more complex hash. It does not produce an encrypted hash. Since HMAC can use any hashing algorithm, it is not necessarily using MD5 and with the added randomness, collisions are less common that with MD5 on its own.

 

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series

  • Security+ Question of the Week: Deploying a Firewall
  • Security+ Question of the Week: Flood Guard
  • Security+ Question of the Week: iSCSI
  • Security+ Question of the Week: Wireless MAC Filtering
  • Security+ Question of the Week: Quantitative Analysis
  • Security+ Question of the Week: Contracts
  • Security+ Question of the Week: System Clock
  • Security+ Question of the Week: Security Breach Incident Response
  • Security+ Question of the Week: Reduce Electrostatic Discharge
  • Security+ Question of the Week: Planting Malware
  • Security+ Question of the Week: Network Hardening
  • Security+ Question of the Week: Fuzzing
  • Security+ Question of the Week: Single Sign‐On
  • Security+ Question of the Week: Digital Envelope
  • Security+ Question of the Week: Confining Communications to a Subnet
  • Security+ Question of the Week: DoS Tool
  • Security+ Question of the Week: Intranet Defense
  • Security+ Question of the Week: War Driving
  • Security+ Question of the Week: User Rights and Permissions Checks
  • Security+ Question of the Week: Third Party Partnerships
  • Security+ Question of the Week: Indicator of Integrity
  • Security+ Question of the Week: Incident Response Procedure
  • Security+ Question of the Week: Good Password Behavior
  • Security+ Question of the Week: Tailgating
  • Security+ Question of the Week: Differential Backup
  • Security+ Question of the Week: Government and Military
  • Security+ Question of the Week: Backdoor
  • Security+ Question of the Week: Wrong Name or Address
  • Security+ Question of the Week: Increase in Email Hoaxes
  • Security+ Question of the Week: Suspicious Location-Based Messages
  • Security+ Question of the Week: Session Hijack
  • Security+ Question of the Week: Definition of a Threat
  • Security+ Question of the Week: Dismiss Alarms
  • Security+ Question of the Week: NoSQL vs. SQL Database
  • Security+ Question of the Week: BYOD Compliance
  • Security+ Question of the Week: Missing Storage Devices
  • Security+ Question of the Week: Data Processed by an Application
  • Security+ Question of the Week: LDAP Port
  • Security+ Question of the Week: Authentication System
  • Security+ Question of the Week: Cryptographic Solution
  • Security+ Question of the Week: Risk of Collision


from
CERTIVIEW
Posted by Unknown at 03:23
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: certification, CERTIVIEW, course, elearning, Global Knowledge Training Blog, IT, online test, Security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2017 (143)
    • ►  March (19)
    • ►  February (55)
    • ►  January (69)
  • ▼  2016 (1230)
    • ►  December (46)
    • ►  November (61)
    • ▼  October (65)
      • Best Help Desk Certifications For 2017
      • ITIL® Foundation Question of the Week: Service Tra...
      • Cisco Meraki Systems Manager Review
      • Amazon Adds Career Component to AWS Educate
      • CCNP Collaboration Question of the Week: CLI Command
      • Best Endpoint Protection: Android Antivirus and Da...
      • Apple's New MacBook Pro Could Kill the Mouse, Almost
      • How Drones Will Reshape Your Company
      • Windows 10 For IT Pros: Tutorials, Tips & Tricks
      • Microsoft Reveals New Surface Book and Surface Stu...
      • Best Subreddits for IT Pros
      • How the First Email Message was Born
      • Google Jamboard: What You Need to Know
      • Best System Administrator Certifications For 2017
      • Best Rugged iPhone 7 Cases for BYOD Deployment
      • Starting Points to Jumpstart a T-SQL Career
      • How to Enable Remote Desktop in Windows Server 2016
      • Best Online Fax Services 2016
      • ITIL® Foundation Question of the Week: Value of a ...
      • CCNP Collaboration Question of the Week: H.323 End...
      • Amazon's Alexa May be the Next Essential Business ...
      • Best Computer Hardware Certifications For 2017
      • As Old MCSEs Wane the MVA Recertify Option Remain
      • The Unending Challenge of Managing “The Database”
      • Confessions of an IT Pro: Precious Ideas Will Hold...
      • Security+ Question of the Week: Risk of Collision
      • 10 Best Mac Apps for IT Pros
      • Best IT Jokes. Ever.
      • Best Enterprise Architect Certifications For 2017
      • Why Upgrade to Windows Server 2016?
      • Microsoft Enterprise Mobility + Security (EM+S) Re...
      • Microsoft Dynamics 365: Everything You Need to Know
      • ITIL® Foundation Question of the Week: Categorizin...
      • Workplace by Facebook: FAQ
      • 10 Best New Features in Windows Server 2016
      • CCNP Collaboration Question of the Week: Discard D...
      • Best Remote Access Software and Solutions 2017
      • Best Document Management Software and Systems 2016
      • What’s New in Hyper-V for Windows Server 2016
      • 5 New Dropbox for iOS Productivity Features
      • Skills in Demand in the Freelance Marketplace
      • Security+ Question of the Week: Cryptographic Solu...
      • 6 Best Windows 10 Apps for IT Pros
      • Microsoft Azure vs. Amazon Web Services: Cloud Com...
      • Best Data Center Certifications For 2017
      • Cybersecurity Awareness is Cybersecurity Job One
      • Wandering Through Microsoft Ignite 2016 and Explor...
      • Upwork vs. Freelancer: Which is Better for Your Bu...
      • ITIL® Foundation Question of the Week: Types of Se...
      • How to Encrypt Facebook Messenger Chats
      • VMWare Workspace One: What You Need to Know
      • How to Discreetly Say You're Looking for Work via ...
      • CCNP Collaboration Question of the Week: DSP Farm ...
      • Why All the Excitement About the NIST Cybersecurit...
      • Cloud Office Suites Compared: Microsoft vs. Free
      • Best Chrome Extensions for IT Professionals
      • Security+ Question of the Week: Authentication System
      • Salesforce Einstein: What You Need to Know
      • Google Relaunches an IT Certification Program
      • VMWare Reveals Unified Smart Glasses Management
      • Why National Cyber Security Awareness Month Is Our...
      • DSC vs. PowerShell: Changing File System Permissions
      • 7 Apps to Improve Slack Communication
      • ITIL® Foundation Question of the Week: Service No ...
      • How to Increase Your Personal Privacy in Windows 10
    • ►  September (66)
    • ►  August (75)
    • ►  July (39)
    • ►  June (71)
    • ►  May (68)
    • ►  April (175)
    • ►  March (201)
    • ►  February (199)
    • ►  January (164)
  • ►  2015 (947)
    • ►  December (190)
    • ►  November (248)
    • ►  October (291)
    • ►  September (218)

About Me

Unknown
View my complete profile
Simple theme. Powered by Blogger.