Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Broadcom Exam 250-586 Topic 5 Question 6 Discussion

Actual exam question for Broadcom's 250-586 exam
Question #: 6
Topic #: 5
[All 250-586 Questions]

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Show Suggested Answer Hide Answer
Suggested Answer: A

The purpose of a Threat Defense for Active Directory Deceptive Account is to expose attackers as they attempt to gather credential information from workstation memory. These deceptive accounts are crafted to resemble legitimate credentials but are, in fact, traps that alert administrators to malicious activity. When an attacker attempts to access these deceptive credentials, it indicates potential unauthorized efforts to harvest credentials, allowing security teams to detect and respond to these intrusions proactively.

SES Complete Documentation explains the use of deceptive accounts as part of a proactive defense strategy, where false credentials are seeded in vulnerable areas to catch and track attacker movements within the network.


Contribute your Thoughts:

Rebbecca
3 months ago
Option A, all the way! Exposing those attackers is like catching a bunch of mice in a cheese factory.
upvoted 0 times
...
Isaiah
3 months ago
Option C seems like the most straightforward way to protect the Domain Admins Group. Boring, but effective!
upvoted 0 times
Malcolm
1 months ago
User 4: Definitely, security should always be a top priority.
upvoted 0 times
...
Rodolfo
1 months ago
User 3: I agree, it's better to be safe than sorry.
upvoted 0 times
...
Junita
2 months ago
User 2: Yeah, it's important to prevent attackers from accessing sensitive information.
upvoted 0 times
...
Mila
2 months ago
User 1: Option C seems like the most straightforward way to protect the Domain Admins Group.
upvoted 0 times
...
...
Marjory
3 months ago
I believe it also assigns fake NTLM password hash values to users with AdminCount attribute.
upvoted 0 times
...
Joanna
3 months ago
This is a tough one, but I'm feeling Option B. Gotta love a good 'treasure map' trap!
upvoted 0 times
...
Coletta
3 months ago
Option D is the only one that mentions NTLM hashes, so that's gotta be the right answer. Time to fake 'em out!
upvoted 0 times
Donte
1 months ago
D) It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.
upvoted 0 times
...
Novella
1 months ago
C) It prevents attackers from reading the contents of the Domain Admins Group
upvoted 0 times
...
Juan
2 months ago
B) It acts as a honeypot to expose attackers as they attempt build their AD treasure map
upvoted 0 times
...
Renea
2 months ago
A) It exposes attackers as they seek to gather credential information from workstation memory
upvoted 0 times
...
...
Valentine
3 months ago
I agree with Delpha, it acts as a honeypot to catch attackers building their AD treasure map.
upvoted 0 times
...
Delpha
3 months ago
I think the purpose is to expose attackers trying to gather credential information.
upvoted 0 times
...
Tyisha
3 months ago
I'm going with Option A. Exposing the attackers as they try to gather credentials is just too good to pass up.
upvoted 0 times
Barbra
2 months ago
I see your point, but I still think Option C is the best way to prevent attackers from accessing sensitive information.
upvoted 0 times
...
Mel
2 months ago
I think Option B could also be effective in luring attackers and exposing them.
upvoted 0 times
...
Kris
2 months ago
I agree, Option A sounds like a great way to catch attackers in the act.
upvoted 0 times
...
...
Magdalene
3 months ago
Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
Rosalind
2 months ago
User 4: It's important to stay one step ahead of attackers, and using deceptive accounts can help in that.
upvoted 0 times
...
Lonna
3 months ago
User 3: I agree, using deceptive accounts to track and monitor malicious activity is a smart defense strategy.
upvoted 0 times
...
Gilberto
3 months ago
User 2: Yeah, honeypots can be really effective in luring attackers and exposing their tactics.
upvoted 0 times
...
Malinda
3 months ago
User 1: Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
...
...

Save Cancel