You deploy a web app that is used as a management portal for indexing in Azure Cognitive Search. The app is configured to use the primary admin key.
During a security review, you discover unauthorized changes to the search index. You suspect that the primary access key is compromised.
You need to prevent unauthorized access to the index management endpoint. The solution must minimize downtime.
What should you do next?
A . Regenerate the primary admin key, change the app to use the secondary admin key, and then regenerate the secondary admin key.
B . Change the app to use a query key, and then regenerate the primary admin key and the secondary admin key.
C . Regenerate the secondary admin key, change the app to use the secondary admin key, and then regenerate the primary key.
D . Add a new query key, change the app to use the new query key, and then delete all the unused query keys.
Regenerate admin keys.
Two admin keys are created for each service so that you can rotate a primary key, using the secondary key for business continuity.