Examlex
A cryptographer has developed a new proprietary hash function for a company and solicited employees to test the function before recommending its implementation. An employee takes the plaintext version of a document and hashes it, then changes the original plaintext document slightly and hashes it, and continues repeating this process until two identical hash values are produced from two different documents. Which of the following BEST describes this cryptographic attack?
Shays's Rebellion
An armed uprising in Western Massachusetts in 1786-1787, led by Daniel Shays, highlighting the need for a stronger national government which led to the drafting of the U.S. Constitution.
Articles of Confederation
The first constitution of the United States, ratified in 1781, which was replaced by the US Constitution in 1789 due to its weaknesses in central authority.
Revolutionary War
The conflict (1775-1783) between the thirteen American colonies and Great Britain, leading to the independence of the United States.
Louisiana Purchase
The acquisition of the territory of Louisiana by the United States from France in 1803, doubling the size of the U.S. and opening the west for expansion.
Q72: An organization is comparing and contrasting migration
Q134: Which of the following is the MOST
Q183: During a recent audit, it was discovered
Q242: A penetration tester finds that a company's
Q275: While testing a new vulnerability scanner, a
Q394: Company XYZ has decided to make use
Q703: Which of the following must be intact
Q744: A Chief Information Officer (CIO) drafts an
Q1072: A company is developing a new secure
Q1086: A systems administrator has created network file