Live Quiz Arena
🎁 1 Free Round Daily
⚡ Enter ArenaQuestion
← Logic & PuzzlesA software supply chain uses cryptographic hashes to verify component integrity. Which failure mode becomes likely when a weak hashing algorithm with poor collision resistance is employed?
A)Reduced computational processing efficiency
B)Malicious component substitution goes undetected✓
C)Network bandwidth usage becomes excessive
D)Unauthorized system access by brute force
💡 Explanation
A weak hashing algorithm makes malicious component substitution likely, because its poor collision resistance leads to different components producing the same hash value, therefore malicious replacements are not detected, rather than computational costs, bandwidth, or system access being directly affected.
🏆 Up to £1,000 monthly prize pool
Ready for the live challenge? Join the next global round now.
*Terms apply. Skill-based competition.
Related Questions
Browse Logic & Puzzles →- Which outcome occurs when a manufacturing robot arm attempts to simultaneously grip and release an object based on contradictory sensor readings?
- A database server must handle increasing read queries; which mechanism explains why response time degrades linearly as a function of records using sequential search?
- If an automated spam filter flags an email as suspicious, which consequence related to conditional probability follows?
- What happens to the computation of unique paths in a grid when a single cell is doubly counted?
- What happens to the accuracy of a medical diagnostic test when the pre-test probability of disease decreases significantly in a population?
- A search algorithm must locate a student record within a database of 10,000 entries. Which algorithm provides the MOST efficient time complexity in the worst-case scenario?
