1. Examine the following password hashes obtained from a Windows XP machine using LM hashing:
Which of the following is true regarding the hashes listed?
A. The hashes are protected using Syskey.
B. The third hash listed is the local administrator’s password.
C. The first hash listed is from a password of seven characters or less.
D. The hashes can be easily decrypted by reversing the hash algorithm.
2. Which of the following correctly describes brute-force password ...