(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which hashing algorithm is known for being utilized in cryptographic applications?

  1. MD5

  2. SHA-2

  3. BMAC

  4. Both A and B

The correct answer is: Both A and B

Choosing an option that includes both MD5 and SHA-2 accurately reflects the fact that both algorithms have historically been used in various cryptographic applications. MD5, although considered weak due to vulnerabilities that allow for collision attacks, was widely adopted for integrity checks, digital signatures, and other cryptographic uses in the past. However, due to its security flaws, its use in new applications is generally discouraged today. SHA-2, on the other hand, is a more robust family of hashing algorithms that includes SHA-224, SHA-256, SHA-384, and SHA-512. It is extensively utilized in security protocols and applications, such as SSL/TLS certificates, digital signatures, and data integrity verification, due to its enhanced security features compared to its predecessors. Although MD5 is outdated and not recommended for secure applications today, its prior prevalence in cryptographic systems justifies its inclusion alongside SHA-2 as both have been utilized in cryptographic contexts.