exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 2 question 13 discussion

Actual exam question from Microsoft's SC-200
Question #: 13
Topic #: 2
[All SC-200 Questions]

You are responsible for responding to Azure Defender for Key Vault alerts.
During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.
What should you configure to mitigate the threat?

  • A. Key Vault firewalls and virtual networks
  • B. Azure Active Directory (Azure AD) permissions
  • C. role-based access control (RBAC) for the key vault
  • D. the access policy settings of the key vault
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Eltooth
Highly Voted 3 years, 7 months ago
A is correct. B has nothing to do with Key Vault. C & D only check against user permissions to key vault and not suspicious IP addresses.
upvoted 68 times
NickHSO
3 years, 4 months ago
upvote for additional knowledge
upvoted 13 times
...
...
Haha0010
Highly Voted 2 years, 3 months ago
Selected Answer: A
In exam today (16 jan 2023)
upvoted 14 times
...
xRiot007
Most Recent 4 months, 4 weeks ago
Selected Answer: A
The issue here is that the request comes from Tor. While I do not agree with corporations blocking the use of Tor, the correct answer is A - a firewall can deal with such.
upvoted 1 times
...
Nikki0222
6 months, 1 week ago
A correct
upvoted 1 times
...
chepeerick
1 year, 6 months ago
option A
upvoted 1 times
...
albd
2 years, 4 months ago
In Exam today (23 dec 2022)
upvoted 8 times
...
xbonex99
2 years, 9 months ago
If detection is based on IP or node (network). Solution would be firewall. If detection is based on access or user related, then the solution is related with updating or modifying the policy.
upvoted 4 times
...
subhuman
3 years, 1 month ago
Selected Answer: A
Answer is correct. To be able to prevent unauthorized access to the key vault through suspicious IPs you have to change the networking settings under the key vault resource
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago