List of questions
Related questions
Question 10 - SC-200 discussion
You are responsible for responding to Azure Defender for Key Vault alerts.
During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.
What should you configure to mitigate the threat?
A.
Key Vault firewals and virtual networks
B.
Azure Active Directory (Azure AD) permissions
C.
role-based access control (RBAC) for the key vault
D.
the access policy settings of the key vault
Your answer:
0 comments
Sorted by
Leave a comment first