To configure several accounts for attackers to exploit in Microsoft Defender for Identity, adding accounts as what type of accounts is incorrect?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Enhance your cybersecurity skills with the Microsoft Security Operations Analyst (SC-200) Exam. Explore topics with multiple choice questions and detailed explanations. Prepare effectively and become a certified Security Operations Analyst!

In the context of configuring accounts within Microsoft Defender for Identity, it is important to understand the security posture and the typical use of different types of accounts. The choice of using general user accounts for exploitation purposes is not fitting, as these accounts typically have limited permissions and access compared to sensitive or admin accounts.

Sensitive accounts are often targeted by attackers due to their elevated access and ability to perform critical functions within an organization. Admin accounts also hold significant power and are likely to be attractive targets for attackers. Service accounts, on the other hand, are used for running services and applications, but they can also be misconfigured and potentially exploited.

General user accounts, however, are designed for everyday tasks by employees and generally do not have access to sensitive operations or data. As a result, they do not present the same level of risk or value for attackers compared to sensitive or admin accounts. Thus, assigning several accounts as general user accounts would not align with the objective of configuring accounts for attackers to exploit effectively.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy