Question 125:
Azure IoT provides a number of patterns and options to design and implement security in your IoT solutions. One of the key components of the security architecture is the security of the cloud part, i.e. how the different components of a solution can access the IoT Hub endpoints, minimizing the exposure to unauthorized access. While building your solution, you design the access policies for three components: Event processor Device app Device manager component Which policy should you use for which component?
Answer options:
A.device; service; registryReadWrite B.registryRead; device; registryReadWrite C.service; iothubowner; iothubowner D.service; device; registryReadWrite