O'Reilly logo

CEH Certified Ethical Hacker Practice Exams by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
  1.  Examine the following password hashes obtained from a Windows XP machine using LM hashing:
B757BF5C0D87772FAAD3B435B51404EE
BA810DBA98995F1817306D272A9441BB
E52CAC67419A9A224A3B108F3FA6CB6D
0182BD0BD4444BF836077A718CCDF409
CEC52EB9C8E3455DC2265B23734E0DAC
Which of the following is true regarding the hashes listed?
A.  The hashes are protected using Syskey.
B.  The third hash listed is the local administrator’s password.
C.  The first hash listed is from a password of seven characters or less.
D.  The hashes can be easily decrypted by reversing the hash algorithm.
  C. Windows 2000 and NT-type machines used something called LAN ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required