
Microsoft Cybersecurity Architect Expert SC-100
Get started today
Ultimate access to all questions.
Your company is in the process of developing an invoicing application, which is set to utilize Azure Active Directory (Azure AD) B2C for identity and access management. This application will be deployed as an App Service web app on the Azure platform. You are tasked with recommending a solution to the application development team to protect the application from potential identity-related threats. What two configurations would you suggest to enhance the security of the application? Each correct recommendation provides part of the solution. NOTE: Each correct configuration is worth one point.
Your company is in the process of developing an invoicing application, which is set to utilize Azure Active Directory (Azure AD) B2C for identity and access management. This application will be deployed as an App Service web app on the Azure platform. You are tasked with recommending a solution to the application development team to protect the application from potential identity-related threats. What two configurations would you suggest to enhance the security of the application? Each correct recommendation provides part of the solution. NOTE: Each correct configuration is worth one point.
Exam-Like