You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web
application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user
information.
The application access key for TeamSite1 has been compromised.
You need to ensure that users can continue to use TeamSite1 and that the compromised
key does not allow access to the data in your Azure AD tenant.
Which two actions should you perform? Each correct answer presents part of the solution.
A.
Remove the compromised key from the application definition for TeamSite1.
B.
Delete the application definition for TeamSite1.
C.
Generate a new application key for TeamSite1.
D.
Generate a new application definition for TeamSite1.
E.
Update the existing application key.
or
generate key
update
is above answer is correct?
Joni – you are a moron. That is all.
Answer is correct, But in Exam options are jumbled.
Be careful while answering
hahaha
The answer is not correct. The correct answer is C and E.
When an application key has been compromised, you have to regenerate it. When you have regenerated the application key, you should update your app with the new key value.
https://msdn.microsoft.com/en-us/library/azure/jj193164.aspx
when a key is compromised,
1, regenerate a new key
2, update app with the new key
so the right ans is C & E
but E does not say “update app with the new key” it says “Update the EXISTING application key”
C, E
totally agree with Mcjohn. (C,E)
Generate a new Key and then Update it
I would argue that the correct answer is A,C.
It is said you don’t want the compromised key to allow accessing user data: you therefore need to remove it. Therefore A.
And you clearly need to generate a new one, therefore C.
While they mention you administer the AAD tenant and its application, nobody says you administer the Sharepoint web application. Updating the key in the client application is probably not up to you, and not relevant to this question.
I would argue that the correct answer is A,C.
It is said you don’t want the compromised key to allow accessing user data: you therefore need to remove it. Therefore A.
And you clearly need to generate a new one, therefore C.
While they mention you administer the AAD tenant and its application, nobody says you administer the Sharepoint web application. Updating the key in the client application is probably not up to you, and not relevant to this question.
Answer is A,C.
You need to ensure the compromised key does not allow to access the user data. The only way to do this is to remove it, therefore A.
You need a generate a new key otherwise it will be impossible for the Sharepoint app to access the AAD tenant for user information, therefore C.
While the question mentions that you administer an AAD tenant and its applications, nowhere does it mention that you also manage the Sharepoint site. This may well be left to another system administrator. This lead to think that updating the key in the Sharepoint web app is unrelated to this question and not our concern. Where I work, that would be the case.
Remove the compromised key from the application definition for TeamSite1.
Generate a new application key for TeamSite1.
remove
generate a new application key
Answers A and C :
Generate a new application key for TeamSite1.
Remove the compromised key from the application definition for TeamSite1.
Search for “compromised” in these pages:
https://azure.microsoft.com/en-us/documentation/articles/active-directory-integrating-applications
With screenshots:
https://blogs.msdn.microsoft.com/mvpawardprogram/2014/02/03/identity-in-your-own-apps-with-windows-azure-active-directory-part-2/
Agreed on A & C.
Why not E: because you cannot replace/update unless you generate a new key.
Many idiots are here. Incredible. Agreed on A & C.
“Update the connection strings in your application code to reference the secondary access key of the storage account.
Regenerate the primary access key for your storage account. On the Access Keys blade, click Regenerate Key1, and then click Yes to confirm that you want to generate a new key.
Update the connection strings in your code to reference the new primary access key.
Regenerate the secondary access key in the same manner.”