VibraXX
Live Quiz Arena
🎁 1 Free Round Daily
⚡ Enter Arena
HomeCategoriesLogic & PuzzlesQuestion
Question
Logic & Puzzles

A software supply chain uses cryptographic hashes to verify component integrity. Which failure mode becomes likely when a weak hashing algorithm with poor collision resistance is employed?

A)Reduced computational processing efficiency
B)Malicious component substitution goes undetected
C)Network bandwidth usage becomes excessive
D)Unauthorized system access by brute force

💡 Explanation

A weak hashing algorithm makes malicious component substitution likely, because its poor collision resistance leads to different components producing the same hash value, therefore malicious replacements are not detected, rather than computational costs, bandwidth, or system access being directly affected.

🏆 Up to £1,000 monthly prize pool

Ready for the live challenge? Join the next global round now.
*Terms apply. Skill-based competition.

⚡ Enter Arena

Related Questions

Browse Logic & Puzzles