ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 10 - SC-200 discussion

Report
Export

You are responsible for responding to Azure Defender for Key Vault alerts.

During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.

What should you configure to mitigate the threat?

A.

Key Vault firewals and virtual networks

Answers
A.

Key Vault firewals and virtual networks

B.

Azure Active Directory (Azure AD) permissions

Answers
B.

Azure Active Directory (Azure AD) permissions

C.

role-based access control (RBAC) for the key vault

Answers
C.

role-based access control (RBAC) for the key vault

D.

the access policy settings of the key vault

Answers
D.

the access policy settings of the key vault

Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/key-vault/qeneral/network-security

asked 05/10/2024
MOHD SAIFUL SYAHMI SAIFUDDIN
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first