Which of the following parameters describe LM Hash (see…

Which of the following parameters describe LM Hash (see exhibit):
Exhibit:

Which of the following parameters describe LM Hash (see exhibit):
Exhibit:

A.
I, II, and III

B.
I

C.
II

D.
I and II

Explanation:
The LM hash is computed as follows:
1. The user’s password is restricted to a maximum of fourteen characters.
2. The user’s password is converted to uppercase.
Etc.
14 character Windows passwords, which are stored with LM Hash, can be cracked in five seconds.
https://en.wikipedia.org/wiki/LM_hash



Leave a Reply 0

Your email address will not be published. Required fields are marked *