New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 7 Question 74 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 74
Topic #: 7
[All CPEH-001 Questions]

Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three)

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

0/2000 characters
Ronny
3 months ago
Effective length of 7 characters is just ridiculous!
upvoted 0 times
...
Paulene
3 months ago
I think B is a bit misleading, they aren't always sent in clear text.
upvoted 0 times
...
Lezlie
4 months ago
Wait, they convert passwords to uppercase? That's wild!
upvoted 0 times
...
Aide
4 months ago
Totally agree, LM hashes are super outdated.
upvoted 0 times
...
Roslyn
4 months ago
A, C, and D are definitely weaknesses.
upvoted 0 times
...
Reyes
4 months ago
I feel like I read somewhere that LM hashes are sent in clear text, but I can't recall if that's one of the main weaknesses.
upvoted 0 times
...
Bobbie
4 months ago
I practiced a question similar to this, and I think one of the weaknesses is that they use 32-bit encryption, which is pretty outdated.
upvoted 0 times
...
William
5 months ago
I’m not entirely sure, but I think the effective length of LM hashes is only 7 characters, which is a huge weakness.
upvoted 0 times
...
Ludivina
5 months ago
I remember that LM hashes convert passwords to uppercase, which really limits the complexity.
upvoted 0 times
...
Renato
5 months ago
I've studied this topic before, so I think I've got a good handle on it. The key things to remember are that LM hashes are case-insensitive and use very weak encryption. I'm feeling good about this one.
upvoted 0 times
...
Rosendo
5 months ago
Hmm, I'm not too sure about this one. I know LM hashes are weak, but I can't remember all the specific weaknesses. I'll have to think this through carefully.
upvoted 0 times
...
Lenna
5 months ago
This question seems straightforward. I'm pretty confident I can identify the three known weaknesses of LM hashes.
upvoted 0 times
...
Lauran
5 months ago
Okay, let's see. I know LM converts passwords to uppercase, which is a major weakness. And I think it uses a really short encryption key length too. I'll have to double-check the other options.
upvoted 0 times
...
Alpha
5 months ago
Hmm, this is a tricky one. I'll need to think through the characteristics of each pattern and how the Service Agent pattern might be used to address them.
upvoted 0 times
...
Cornell
5 months ago
Satellites definitely don't use 4G/LTE or 2G/2.5G, so those are out. I'm leaning towards L-band, but I'll double-check my notes just to be sure.
upvoted 0 times
...
Crista
5 months ago
I think IVR System Prompts are definitely included in the auto-install, but I might be mixing it up with another question about device setup.
upvoted 0 times
...
Blair
10 months ago
Wait, the LM hash sends passwords in clear text? That's just asking for trouble! A, C, and D are bad enough, but B is the real nail in the coffin. Time to put this dinosaur out of its misery.
upvoted 0 times
Curt
9 months ago
Agreed, the 7 character limit is also a vulnerability.
upvoted 0 times
...
Kathrine
9 months ago
Definitely, using only 32 bit encryption is a major weakness.
upvoted 0 times
...
Delila
9 months ago
Yes, sending hashes in clear text is a big security risk.
upvoted 0 times
...
...
Izetta
10 months ago
Ah, the good ol' LM hash. A, C, and D are classic weaknesses. As for B, I hear the hackers like to have a little 'clear text' party over the network. Where's the fun in encrypting everything?
upvoted 0 times
Inocencia
9 months ago
B) Hashes are sent in clear text over the network.
upvoted 0 times
...
Kiley
9 months ago
D) Effective length is 7 characters.
upvoted 0 times
...
Freeman
9 months ago
C) Makes use of only 32 bit encryption.
upvoted 0 times
...
Belen
9 months ago
A) Converts passwords to uppercase.
upvoted 0 times
...
...
Deandrea
10 months ago
Haha, the LM hash is like a security Swiss cheese - full of holes! A, C, and D are spot on. As for B, I think I'll just stick my head in the sand on that one.
upvoted 0 times
...
Lavonda
11 months ago
Definitely A, C, and D. The LM hash is a relic from the past and has so many security flaws. I can't believe it's still in use in some systems!
upvoted 0 times
Eve
9 months ago
C) Makes use of only 32 bit encryption.
upvoted 0 times
...
Kanisha
10 months ago
A) Converts passwords to uppercase.
upvoted 0 times
...
...
Ivette
11 months ago
I also heard that LM only uses 32 bit encryption, which makes it vulnerable to attacks.
upvoted 0 times
...
Doretha
11 months ago
A, C, and D all seem to be correct weaknesses of LM hashes. I'm a bit unsure about B though. Aren't the hashes supposed to be encrypted when sent over the network?
upvoted 0 times
Craig
9 months ago
B) Hashes are sent in clear text over the network.
upvoted 0 times
...
Elbert
9 months ago
D) Effective length is 7 characters.
upvoted 0 times
...
Carin
10 months ago
C) Makes use of only 32 bit encryption.
upvoted 0 times
...
Blair
10 months ago
A) Converts passwords to uppercase.
upvoted 0 times
...
...
Dortha
11 months ago
Yeah, that's true. Another weakness is that the hashes are sent in clear text over the network.
upvoted 0 times
...
Ivette
11 months ago
I think one weakness of LM is that it converts passwords to uppercase.
upvoted 0 times
...

Save Cancel