New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 2 Question 81 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 81
Topic #: 2
[All CPEH-001 Questions]

One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out?

Select the best answers.

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

0/2000 characters
Antonio
3 months ago
Complex passwords are a must! They really help against cracking attempts.
upvoted 0 times
...
Olga
3 months ago
Wait, are we really still using LM hashes? That’s surprising!
upvoted 0 times
...
Henriette
3 months ago
SYSKEY is decent, but I’m not convinced it’s foolproof.
upvoted 0 times
...
Cammy
4 months ago
Totally agree, NTLMV1 is not a solid defense anymore.
upvoted 0 times
...
Ashleigh
4 months ago
John the Ripper is great for cracking, but yeah, it doesn’t show case sensitivity.
upvoted 0 times
...
Laurena
4 months ago
I definitely remember that enforcing complex passwords is crucial. It’s one of the best practices we discussed in class!
upvoted 0 times
...
Brett
4 months ago
SYSKEY sounds familiar as a countermeasure, but I can't recall if it's still considered secure today.
upvoted 0 times
...
Luz
4 months ago
I think NTLMV1 is outdated and not really effective against modern attacks. I might lean towards NTLMV2 instead.
upvoted 0 times
...
Blondell
5 months ago
I remember studying that John the Ripper is powerful, but I’m not sure about the case sensitivity issue. Does it really not show that?
upvoted 0 times
...
Kiley
5 months ago
Hmm, the output limitation of John the Ripper is an interesting detail. I'll make sure to select that one since it's a specific weakness of that tool.
upvoted 0 times
...
Alesia
5 months ago
The password complexity requirement seems like a solid strategy to prevent cracking. I'm pretty confident that's a good answer, but I'll double-check the other options as well.
upvoted 0 times
...
Micheline
5 months ago
I'm a bit confused about the NTLMV1 and SYSKEY options. I'll need to review those concepts to determine if they are effective countermeasures or not.
upvoted 0 times
...
Selma
5 months ago
Okay, let's go through this step-by-step. The question is asking about true statements related to Windows LM hashes and password cracking, so I'll focus on understanding the countermeasures mentioned.
upvoted 0 times
...
Katina
5 months ago
This question seems straightforward, but I want to make sure I understand the key points about LM hashes and password cracking before selecting the best answers.
upvoted 0 times
...
Ulysses
5 months ago
Okay, let's see - inventory data sources, review network topology, those sound like good steps. I'll mark those.
upvoted 0 times
...
Patria
5 months ago
This question seems straightforward, I think the answer is B - Alter the layout of iViews as they appear on a workspace.
upvoted 0 times
...
Dudley
5 months ago
I think the multicast Reverse Path Forwarding check is used to create a loop-free distribution tree from the source to the receivers. That sounds like option A to me.
upvoted 0 times
...
Farrah
5 months ago
Alright, I've got a few ideas. Lowering the tunnel MTU could help with the connection issues, or adjusting the IPSec replay window might do the trick.
upvoted 0 times
...
Maryann
9 months ago
Complex passwords, you say? Sounds like a real party trick to keep the hackers at bay. I'll make sure my team knows the drill - upper, lower, numbers, and special chars. Bring it on!
upvoted 0 times
...
Clement
9 months ago
7 characters or less, huh? Yikes, that's like leaving the keys in the car with a 'Free Candy' sign on it. Time to beef up those Windows passwords, folks!
upvoted 0 times
Ming
8 months ago
7 characters or less? Definitely time to beef up those Windows passwords!
upvoted 0 times
...
Lang
8 months ago
E) Enforcing Windows complex passwords is an effective countermeasure.
upvoted 0 times
...
Norah
9 months ago
A) John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case.
upvoted 0 times
...
...
Arlean
10 months ago
SYSKEY, huh? Sounds like a real heavyweight champion in the password protection arena. I'll have to give that a try.
upvoted 0 times
Douglass
8 months ago
Enforcing complex passwords is also important for security.
upvoted 0 times
...
Laura
9 months ago
Yes, it uses 128 bit encryption on the local copy of the Windows SAM.
upvoted 0 times
...
Maurine
9 months ago
SYSKEY is a great tool for password protection.
upvoted 0 times
...
...
Vernice
10 months ago
NTLMV1? Really? That's like putting a Band-Aid on a gunshot wound. Time to upgrade to NTLMV2 and put those password crackers in their place!
upvoted 0 times
Lavonne
9 months ago
NTLMV1? Really? That's like putting a Band-Aid on a gunshot wound. Time to upgrade to NTLMV2 and put those password crackers in their place!
upvoted 0 times
...
Bettina
9 months ago
E) Enforcing Windows complex passwords is an effective countermeasure.
upvoted 0 times
...
Denae
9 months ago
B) BY using NTLMV1, you have implemented an effective countermeasure to password cracking.
upvoted 0 times
...
Annelle
10 months ago
A) John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case.
upvoted 0 times
...
...
Twila
10 months ago
I think option B is the best answer. Using NTLMV1 is a good countermeasure to password cracking.
upvoted 0 times
...
Ena
10 months ago
I agree with you, Nakisha. But I also believe that enforcing Windows complex passwords is an effective countermeasure.
upvoted 0 times
...
Brett
10 months ago
John the Ripper is a beast! But I'm a little bummed the output doesn't show case sensitivity. Guess I'll have to do some extra work to figure that out.
upvoted 0 times
Darrin
9 months ago
User 2
upvoted 0 times
...
Bernardo
9 months ago
User 1
upvoted 0 times
...
Celia
9 months ago
E) Enforcing Windows complex passwords is an effective countermeasure.
upvoted 0 times
...
Farrah
10 months ago
A) John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case.
upvoted 0 times
...
...
Nakisha
11 months ago
I think option A is true because John the Ripper doesn't show if the password is upper or lower case.
upvoted 0 times
...

Save Cancel