You are responsible for responding to Azure Defender for Key Vault alerts.
During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.
What should you configure to mitigate the threat?
A . Key Vault firewalls and virtual networks
B . Azure Active Directory (Azure AD) permissions
C . role-based access control (RBAC) for the key vault
D . the access policy settings of the key vault
Answer: A
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/key-vault/general/network-security
Latest SC-200 Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund