What should you configure to mitigate the threat?
You are responsible for responding to Azure Defender for Key Vault alerts.
During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.
What should you configure to mitigate the threat?
A . Key Vault firewalls and virtual networks
B . Azure Active Directory (Azure AD) permissions
C . role-based access control (RBAC) for the key vault
D . the access policy settings of the key vault
Answer: A
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/key-vault/general/network-security
Latest SC-200 Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments