CREST Practitioner Security Analyst (CPSA) Practice

Disable ads (and more) with a membership for a one time $2.99 payment

Master the CREST Practitioner Security Analyst Exam. Prepare with quizzes and comprehensive study guides that include tips and explanations. Excel in your certification journey!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following describes the nature of an NTLM hash?

  1. It stores user credentials securely

  2. It uses symmetric encryption for data privacy

  3. It is a single-use hashed value

  4. It generates a unique identifier for network routes

The correct answer is: It stores user credentials securely

The nature of an NTLM hash primarily involves its role in storing user credentials securely. NTLM, or NT LAN Manager, is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users and systems across networks. The NTLM hash is a one-way encrypted representation of a user's password, and while it is not impervious to attacks—particularly to hash cracking and rainbow table attacks—it does serve the essential function of protecting the user's password during the authentication process by storing it in a non-reversible format. The use of this hash format means that even if an attacker manages to access the hash values, they cannot easily reconstruct the original passwords, which provides a layer of security. Nonetheless, it is important to note that best practices recommend stronger authentication methods, as NTLM is considered more vulnerable than newer protocols such as Kerberos. The other options do not accurately represent the attributes of NTLM hashes. For instance, NTLM does not use symmetric encryption; instead, it relies on hashing. Additionally, it is not a single-use hashed value, as it can be consistently used until the corresponding password changes. Finally, it does not generate unique identifiers for network routes, which falls outside its functional scope. Thus, the correct choice underscores the