Which of the following parameters describe LM Hash (see exhibit): Exhibit:A. I, II, and III B. I C. II D. I and II Suggested Answer: A The LM hash is computed as follows: 1. The user's password is restricted to a maximum of fourteen characters. 2. The users password is converted to uppercase. Etc. 14 character Windows passwords, which are stored with LM Hash, can be cracked in five seconds. References: https://en.wikipedia.org/wiki/LM_hash This question is in 312-50V9 EC-Council Certified Ethical Hacker v9 Exam For getting EC-Council Certified Ethical Hacker (CEH) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer