Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 7 Question 74 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 74
Topic #: 7
[All CPEH-001 Questions]

Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three)

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

Blair
1 months ago
Wait, the LM hash sends passwords in clear text? That's just asking for trouble! A, C, and D are bad enough, but B is the real nail in the coffin. Time to put this dinosaur out of its misery.
upvoted 0 times
Curt
28 days ago
Agreed, the 7 character limit is also a vulnerability.
upvoted 0 times
...
Kathrine
1 months ago
Definitely, using only 32 bit encryption is a major weakness.
upvoted 0 times
...
Delila
1 months ago
Yes, sending hashes in clear text is a big security risk.
upvoted 0 times
...
...
Izetta
2 months ago
Ah, the good ol' LM hash. A, C, and D are classic weaknesses. As for B, I hear the hackers like to have a little 'clear text' party over the network. Where's the fun in encrypting everything?
upvoted 0 times
Inocencia
5 days ago
B) Hashes are sent in clear text over the network.
upvoted 0 times
...
Kiley
9 days ago
D) Effective length is 7 characters.
upvoted 0 times
...
Freeman
22 days ago
C) Makes use of only 32 bit encryption.
upvoted 0 times
...
Belen
1 months ago
A) Converts passwords to uppercase.
upvoted 0 times
...
...
Deandrea
2 months ago
Haha, the LM hash is like a security Swiss cheese - full of holes! A, C, and D are spot on. As for B, I think I'll just stick my head in the sand on that one.
upvoted 0 times
...
Lavonda
2 months ago
Definitely A, C, and D. The LM hash is a relic from the past and has so many security flaws. I can't believe it's still in use in some systems!
upvoted 0 times
Eve
1 months ago
C) Makes use of only 32 bit encryption.
upvoted 0 times
...
Kanisha
1 months ago
A) Converts passwords to uppercase.
upvoted 0 times
...
...
Ivette
2 months ago
I also heard that LM only uses 32 bit encryption, which makes it vulnerable to attacks.
upvoted 0 times
...
Doretha
2 months ago
A, C, and D all seem to be correct weaknesses of LM hashes. I'm a bit unsure about B though. Aren't the hashes supposed to be encrypted when sent over the network?
upvoted 0 times
Craig
18 days ago
B) Hashes are sent in clear text over the network.
upvoted 0 times
...
Elbert
24 days ago
D) Effective length is 7 characters.
upvoted 0 times
...
Carin
2 months ago
C) Makes use of only 32 bit encryption.
upvoted 0 times
...
Blair
2 months ago
A) Converts passwords to uppercase.
upvoted 0 times
...
...
Dortha
2 months ago
Yeah, that's true. Another weakness is that the hashes are sent in clear text over the network.
upvoted 0 times
...
Ivette
2 months ago
I think one weakness of LM is that it converts passwords to uppercase.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77