Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Broadcom Exam 250-586 Topic 5 Question 6 Discussion

Actual exam question for Broadcom's 250-586 exam
Question #: 6
Topic #: 5
[All 250-586 Questions]

What is the purpose of a Threat Defense for Active Directory Deceptive Account?

Show Suggested Answer Hide Answer
Suggested Answer: A

The purpose of a Threat Defense for Active Directory Deceptive Account is to expose attackers as they attempt to gather credential information from workstation memory. These deceptive accounts are crafted to resemble legitimate credentials but are, in fact, traps that alert administrators to malicious activity. When an attacker attempts to access these deceptive credentials, it indicates potential unauthorized efforts to harvest credentials, allowing security teams to detect and respond to these intrusions proactively.

SES Complete Documentation explains the use of deceptive accounts as part of a proactive defense strategy, where false credentials are seeded in vulnerable areas to catch and track attacker movements within the network.


Contribute your Thoughts:

Rebbecca
1 months ago
Option A, all the way! Exposing those attackers is like catching a bunch of mice in a cheese factory.
upvoted 0 times
...
Isaiah
2 months ago
Option C seems like the most straightforward way to protect the Domain Admins Group. Boring, but effective!
upvoted 0 times
Malcolm
6 days ago
User 4: Definitely, security should always be a top priority.
upvoted 0 times
...
Rodolfo
13 days ago
User 3: I agree, it's better to be safe than sorry.
upvoted 0 times
...
Junita
21 days ago
User 2: Yeah, it's important to prevent attackers from accessing sensitive information.
upvoted 0 times
...
Mila
23 days ago
User 1: Option C seems like the most straightforward way to protect the Domain Admins Group.
upvoted 0 times
...
...
Marjory
2 months ago
I believe it also assigns fake NTLM password hash values to users with AdminCount attribute.
upvoted 0 times
...
Joanna
2 months ago
This is a tough one, but I'm feeling Option B. Gotta love a good 'treasure map' trap!
upvoted 0 times
...
Coletta
2 months ago
Option D is the only one that mentions NTLM hashes, so that's gotta be the right answer. Time to fake 'em out!
upvoted 0 times
Donte
8 days ago
D) It assigns a fake NTLM password hash value for users with an assigned AdminCount attribute.
upvoted 0 times
...
Novella
9 days ago
C) It prevents attackers from reading the contents of the Domain Admins Group
upvoted 0 times
...
Juan
14 days ago
B) It acts as a honeypot to expose attackers as they attempt build their AD treasure map
upvoted 0 times
...
Renea
18 days ago
A) It exposes attackers as they seek to gather credential information from workstation memory
upvoted 0 times
...
...
Valentine
2 months ago
I agree with Delpha, it acts as a honeypot to catch attackers building their AD treasure map.
upvoted 0 times
...
Delpha
2 months ago
I think the purpose is to expose attackers trying to gather credential information.
upvoted 0 times
...
Tyisha
2 months ago
I'm going with Option A. Exposing the attackers as they try to gather credentials is just too good to pass up.
upvoted 0 times
Barbra
1 months ago
I see your point, but I still think Option C is the best way to prevent attackers from accessing sensitive information.
upvoted 0 times
...
Mel
1 months ago
I think Option B could also be effective in luring attackers and exposing them.
upvoted 0 times
...
Kris
1 months ago
I agree, Option A sounds like a great way to catch attackers in the act.
upvoted 0 times
...
...
Magdalene
2 months ago
Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
Rosalind
1 months ago
User 4: It's important to stay one step ahead of attackers, and using deceptive accounts can help in that.
upvoted 0 times
...
Lonna
1 months ago
User 3: I agree, using deceptive accounts to track and monitor malicious activity is a smart defense strategy.
upvoted 0 times
...
Gilberto
2 months ago
User 2: Yeah, honeypots can be really effective in luring attackers and exposing their tactics.
upvoted 0 times
...
Malinda
2 months ago
User 1: Option B sounds like the way to go. Who doesn't love a good honeypot to catch those pesky attackers?
upvoted 0 times
...
...

Save Cancel