You are responsible for responding to Azure Defender for Key Vault alerts. During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node. What should you configure to mitigate the threat?
A.
Key Vault firewalls and virtual networks
B.
Azure Active Directory (Azure AD) permissions
C.
role-based access control (RBAC) for the key vault
The issue here is that the request comes from Tor. While I do not agree with corporations blocking the use of Tor, the correct answer is A - a firewall can deal with such.
If detection is based on IP or node (network). Solution would be firewall.
If detection is based on access or user related, then the solution is related with updating or modifying the policy.
Answer is correct. To be able to prevent unauthorized access to the key vault through suspicious IPs you have to change the networking settings under the key vault resource
upvoted 5 times
...
This section is not available anymore. Please use the main Exam Page.SC-200 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Eltooth
Highly Voted 3 years, 7 months agoNickHSO
3 years, 4 months agoHaha0010
Highly Voted 2 years, 3 months agoxRiot007
Most Recent 4 months, 4 weeks agoNikki0222
6 months, 1 week agochepeerick
1 year, 6 months agoalbd
2 years, 4 months agoxbonex99
2 years, 9 months agosubhuman
3 years, 1 month ago