Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Broadcom Exam 250-586 Topic 5 Question 6 Discussion

Actual exam question for Broadcom's 250-586 exam
Question #: 6
Topic #: 5
[All 250-586 Questions]

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Show Suggested Answer Hide Answer
Suggested Answer: A

The purpose of a Threat Defense for Active Directory Deceptive Account is to expose attackers as they attempt to gather credential information from workstation memory. These deceptive accounts are crafted to resemble legitimate credentials but are, in fact, traps that alert administrators to malicious activity. When an attacker attempts to access these deceptive credentials, it indicates potential unauthorized efforts to harvest credentials, allowing security teams to detect and respond to these intrusions proactively.

SES Complete Documentation explains the use of deceptive accounts as part of a proactive defense strategy, where false credentials are seeded in vulnerable areas to catch and track attacker movements within the network.


Contribute your Thoughts:

Rebbecca
1 days ago
Option A, all the way! Exposing those attackers is like catching a bunch of mice in a cheese factory.
upvoted 0 times
...
Isaiah
2 days ago
Option C seems like the most straightforward way to protect the Domain Admins Group. Boring, but effective!
upvoted 0 times
...
Marjory
3 days ago
I believe it also assigns fake NTLM password hash values to users with AdminCount attribute.
upvoted 0 times
...
Joanna
5 days ago
This is a tough one, but I'm feeling Option B. Gotta love a good 'treasure map' trap!
upvoted 0 times
...
Coletta
9 days ago
Option D is the only one that mentions NTLM hashes, so that's gotta be the right answer. Time to fake 'em out!
upvoted 0 times
...
Valentine
11 days ago
I agree with Delpha, it acts as a honeypot to catch attackers building their AD treasure map.
upvoted 0 times
...
Delpha
14 days ago
I think the purpose is to expose attackers trying to gather credential information.
upvoted 0 times
...
Tyisha
15 days ago
I'm going with Option A. Exposing the attackers as they try to gather credentials is just too good to pass up.
upvoted 0 times
...
Magdalene
21 days ago
Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
Lonna
23 hours ago
User 3: I agree, using deceptive accounts to track and monitor malicious activity is a smart defense strategy.
upvoted 0 times
...
Gilberto
3 days ago
User 2: Yeah, honeypots can be really effective in luring attackers and exposing their tactics.
upvoted 0 times
...
Malinda
7 days ago
User 1: Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77