exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 109 discussion

Actual exam question from CompTIA's CS0-003
Question #: 109
Topic #: 1
[All CS0-003 Questions]

A security analyst is reviewing the findings of the latest vulnerability report for a company’s web application. The web application accepts files for a Bash script to be processed if the files match a given hash. The analyst is able to submit files to the system due to a hash collision. Which of the following should the analyst suggest to mitigate the vulnerability with the fewest changes to the current script and infrastructure?

  • A. Deploy a WAF to the front of the application.
  • B. Replace the current MD5 with SHA-256.
  • C. Deploy an antivirus application on the hosting system.
  • D. Replace the MD5 with digital signatures.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
johnabayot
Highly Voted 1 year ago
Selected Answer: B
Replacing MD5 with digital signatures is a significant change that involves implementing a different authentication mechanism, but with SHA-256 is more straightforward and effective solution to mitigate the vulnerability while minimizing disruption to the current system.
upvoted 7 times
...
maggie22
Highly Voted 10 months, 2 weeks ago
Selected Answer: B
SHA-256 is collision attacks resistant
upvoted 5 times
...
braveheart22
Most Recent 2 months, 2 weeks ago
Selected Answer: B
B is the right answer Explanation A hash collision occurs when two different inputs produce the same hash output. MD5 (Message Digest Algorithm 5) is known to be vulnerable to collisions, meaning attackers can create different files that result in the same MD5 hash. This can lead to security risks, as the system may wrongly accept a malicious file if it has the same hash as a legitimate one. To mitigate this vulnerability, replacing the MD5 hash algorithm with a stronger hash function, like SHA-256 (part of the SHA-2 family), is an effective solution. SHA-256 is much more resistant to collisions, making it harder for an attacker to forge a file that matches the hash of a legitimate one.
upvoted 2 times
...
throughthefray
1 year, 4 months ago
Selected Answer: B
Had it not said "with the fewest changes to the current script and infrastructure?" I would absolutely say D. D would elliminate the positbilities of collisions in the future, but it also requires more changes to the script infrastructure than B. So based on specifically what is being asked I would say B
upvoted 2 times
...
FoeMarc
1 year, 5 months ago
D. Replace the MD5 with digital signatures. Here's why: MD5 to Digital Signatures: Replacing MD5 with digital signatures is a more secure approach to verify the authenticity and integrity of files. Digital signatures provide a higher level of security and are less prone to collision attacks compared to hash functions like MD5. This change can be made within the script itself without major infrastructure changes. Few Changes: This option minimizes changes to the current script and infrastructure. It involves replacing the hashing mechanism within the script while keeping the overall architecture intact.
upvoted 3 times
b0ad9e1
1 year, 4 months ago
SHA-256 can prevent hash collisions which less changes than implementing digital signatures.
upvoted 1 times
...
b0ad9e1
1 year, 4 months ago
Using digital signatures could enhance security, but this approach requires more extensive changes to the infrastructure and script. Digital signatures involve a cryptographic key pair (private and public keys), which complicates the implementation compared to simply updating the hash function.
upvoted 1 times
...
...
kmordalv
1 year, 7 months ago
Selected Answer: B
Seems correct This option involves changing the hash algorithm from the vulnerable MD5 to the more secure SHA-256. It addresses the hash collision vulnerability directly and doesn't require major changes to the existing infrastructure or script logic.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago