Ultimate access to all questions.
Your company is in the process of developing an invoicing application intended to leverage Azure AD B2C for identity management. This application is planned to be deployed as an App Service web app on Azure. As a cybersecurity architect, you are tasked with recommending configurations to the application development team that will enhance the security of the application against identity-related attacks. What are the two configurations you would recommend to protect the application from such threats? Each correct selection contributes part of the overall solution. NOTE: Each solution component is worth one point.