exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 350 discussion

Actual exam question from CompTIA's SY0-701
Question #: 350
Topic #: 1
[All SY0-701 Questions]

Which of the following attacks exploits a potential vulnerability as a result of using weak cryptographic algorithms?

  • A. Password cracking
  • B. On-path
  • C. Digital signing
  • D. Side-channel
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Eracle
2 days, 3 hours ago
Selected Answer: A
The more obvious is Password cracking
upvoted 1 times
...
favouredgirl
2 days, 16 hours ago
Selected Answer: B
The correct answer is: B. On-path Explanation: An on-path attack (formerly known as a man-in-the-middle attack) exploits vulnerabilities in communication channels, including those arising from the use of weak cryptographic algorithms. If an attacker can intercept and manipulate communications between two parties (such as via an on-path attack), they can exploit weak encryption or outdated cryptographic protocols to decrypt or alter the data in transit. Insecure algorithms or improper implementations of cryptographic protocols may allow attackers to bypass encryption protections and gain unauthorized access to sensitive data. For example, if weak encryption algorithms like DES or outdated SSL/TLS versions (e.g., SSL 3.0) are used, an attacker could break the encryption and intercept, modify, or inject malicious data into communications.
upvoted 1 times
...
ProudFather
3 weeks, 5 days ago
Selected Answer: A
Password cracking exploits weak cryptographic algorithms to guess or brute-force passwords. Weak algorithms, like older versions of MD5 or SHA-1, can be easily cracked using modern computing power. This allows attackers to gain unauthorized access to systems and data.
upvoted 2 times
...
AndyK2
1 month ago
Selected Answer: A
Password cracking can exploit vulnerabilities resulting from weak cryptographic algorithms because: Weak encryption methods make password hashes easier to break Insufficient cryptographic complexity reduces resistance to brute-force attacks
upvoted 1 times
...
Nilab
1 month, 1 week ago
Selected Answer: A
Password cracking exploits weak cryptographic algorithms, particularly those used for hashing passwords. If the hashing algorithm is outdated or weak (e.g., MD5, SHA-1), it becomes much easier for attackers to: Perform brute force attacks. Use rainbow tables (precomputed hashes for cracking passwords). Exploit hash collisions (where different inputs produce the same hash value).
upvoted 2 times
...
fmeox567
1 month, 2 weeks ago
Selected Answer: B
B. On-path Explanation: An on-path attack (previously called a "man-in-the-middle attack") exploits weaknesses in the communication channel, often by intercepting, modifying, or injecting malicious data into the communication between two parties. If weak cryptographic algorithms (e.g., outdated encryption protocols or weak ciphers) are used in the communication, an attacker can exploit these weaknesses to decrypt or alter the communication, leading to successful on-path attacks. This type of attack is more effective when encryption is not strong enough to protect against interception. GPT
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago