EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 645  
   
You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password- cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?


 
A:    Passwords of 14 characters or less are broken up into two 7-character hashes
 
B:    A password Group Policy change takes at least 3 weeks to completely replicate throughout a network
C:    Networks using Active Directory never use SAM databases so the SAM database pulled was empty
 
D:    The passwords that were cracked are local accounts on the Domain Controller
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 21/05/2025
Opted Answer: A
LM hash limitation.
In Windows systems, passwords of 14 characters or less are split into two separate 7-character hashes due to the LM (LAN Manager) hash system. This makes them significantly weaker because each half can be cracked independently, reducing the complexity of the password.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations