(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which algorithm is designed to provide a high degree of security against collision attacks?

  1. MD5

  2. SHA-1

  3. SHA-2

  4. RIPEMD

The correct answer is: SHA-2

SHA-2 is recognized for its robust security features, especially in defending against collision attacks. A collision attack occurs when two different inputs produce the same hash output, undermining the integrity of the hashing algorithm. SHA-2, which includes a family of hash functions such as SHA-224, SHA-256, SHA-384, and SHA-512, employs a more complex mathematical structure and longer hash lengths compared to its predecessors like MD5 and SHA-1. This complexity significantly reduces the likelihood of collisions. The advancements in SHA-2, such as increased bit-size and more rounds of processing, contribute to its stronger resistance against potential vulnerabilities that can be exploited in cryptographic attacks. Hence, its design is aimed specifically at providing higher security levels, making it the preferred choice in applications that require secure hashing. While MD5 and SHA-1 were widely used in the past, they have been found to be vulnerable to collision attacks, rendering them less secure for modern applications. RIPEMD, while also aimed at security, does not have the same level of widespread acceptance or proven track record against such attacks when compared to SHA-2. Therefore, SHA-2 stands out as the most resilient option in the context of collision attacks.