New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Broadcom Exam 250-586 Topic 5 Question 6 Discussion

Actual exam question for Broadcom's 250-586 exam
Question #: 6
Topic #: 5
[All 250-586 Questions]

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Show Suggested Answer Hide Answer
Suggested Answer: A

The purpose of a Threat Defense for Active Directory Deceptive Account is to expose attackers as they attempt to gather credential information from workstation memory. These deceptive accounts are crafted to resemble legitimate credentials but are, in fact, traps that alert administrators to malicious activity. When an attacker attempts to access these deceptive credentials, it indicates potential unauthorized efforts to harvest credentials, allowing security teams to detect and respond to these intrusions proactively.

SES Complete Documentation explains the use of deceptive accounts as part of a proactive defense strategy, where false credentials are seeded in vulnerable areas to catch and track attacker movements within the network.


Contribute your Thoughts:

Rebbecca
5 days ago
Option A, all the way! Exposing those attackers is like catching a bunch of mice in a cheese factory.
upvoted 0 times
...
Isaiah
6 days ago
Option C seems like the most straightforward way to protect the Domain Admins Group. Boring, but effective!
upvoted 0 times
...
Marjory
6 days ago
I believe it also assigns fake NTLM password hash values to users with AdminCount attribute.
upvoted 0 times
...
Joanna
9 days ago
This is a tough one, but I'm feeling Option B. Gotta love a good 'treasure map' trap!
upvoted 0 times
...
Coletta
13 days ago
Option D is the only one that mentions NTLM hashes, so that's gotta be the right answer. Time to fake 'em out!
upvoted 0 times
...
Valentine
14 days ago
I agree with Delpha, it acts as a honeypot to catch attackers building their AD treasure map.
upvoted 0 times
...
Delpha
17 days ago
I think the purpose is to expose attackers trying to gather credential information.
upvoted 0 times
...
Tyisha
18 days ago
I'm going with Option A. Exposing the attackers as they try to gather credentials is just too good to pass up.
upvoted 0 times
Kris
3 days ago
I agree, Option A sounds like a great way to catch attackers in the act.
upvoted 0 times
...
...
Magdalene
25 days ago
Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
Rosalind
2 days ago
User 4: It's important to stay one step ahead of attackers, and using deceptive accounts can help in that.
upvoted 0 times
...
Lonna
4 days ago
User 3: I agree, using deceptive accounts to track and monitor malicious activity is a smart defense strategy.
upvoted 0 times
...
Gilberto
7 days ago
User 2: Yeah, honeypots can be really effective in luring attackers and exposing their tactics.
upvoted 0 times
...
Malinda
10 days ago
User 1: Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
...
...

Save Cancel