Which of the following parameters describe LM Hash (see exhibit):
Exhibit:
A.
I, II, and III
B.
I
C.
II
D.
I and II
Explanation:
The LM hash is computed as follows:
1. The user’s password is restricted to a maximum of fourteen characters.
2. The user’s password is converted to uppercase.
Etc.
14 character Windows passwords, which are stored with LM Hash, can be cracked in five seconds.
https://en.wikipedia.org/wiki/LM_hash