What should you configure to mitigate the threat?
You are responsible for responding to Azure Defender for Key Vault alerts.
During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.
What should you configure to mitigate the threat?
A . Key Vault firewalls and virtual networks
B . Azure Active Directory (Azure AD) permissions
C . role-based access control (RBAC) for the key vault
D . the access policy settings of the key vault
Answer: A
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/key-vault/general/network-security
Latest SC-200 Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments