Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50 All Questions

View all questions & answers for the 312-50 exam

Exam 312-50 topic 8 question 62 discussion

Actual exam question from ECCouncil's 312-50
Question #: 62
Topic #: 8
[All 312-50 Questions]

Which of the following parameters describe LM Hash (see exhibit):
Exhibit:

  • A. I, II, and III
  • B. I
  • C. II
  • D. I and II
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
The LM hash is computed as follows:
1. The user's password is restricted to a maximum of fourteen characters.
2. The users password is converted to uppercase.
Etc.
14 character Windows passwords, which are stored with LM Hash, can be cracked in five seconds.
References: https://en.wikipedia.org/wiki/LM_hash

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
a4687eb
4 months, 1 week ago
Statement no III is silly. All depends on machine when cracking process runs. It can be 0.000000000000000001 or less second on some powerfull machine or on week on some 20286 machine... so it can be A or D. of coures this is hacking exam so everything is easy and possible so tehn A is correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...