Option A and B for me. Had something like this in a mock and auto provisioning plus regulatory compliance policies both impacted secure score results (at least that's how it looked). Not 100% if B is really needed though, agree?
Pretty sure D makes sense, since Azure Firewall network rules could block direct RDP traffic. That should stop users from bypassing bastion1, right? Correct me if I'm missing something here.
That's what I'd pick here, since NSGs can control inbound access. Not too sure though, could be missing a detail.
C fits best since Azure SQL Database is a PaaS option, so Microsoft takes care of most patching and updates. Dynamic Data Masking is built in, and costs are lower compared to Managed Instance or spinning up VMs. I’ve seen similar advice in the official guide. Not 100% sure if there’s any hidden gotcha, but C seems to tick all the boxes-anyone think Managed Instance could be better for some edge cases?
You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.) 
D or maybe A? Pretty sure DAST (D) is best for finding XSS and SQL injection since it tests the app in a running state, like an external attacker would. Option A is more focused on combining static and dynamic but isn't as direct for runtime config issues. Anyone see IAST being preferred here?
Nice clear scenario. B fits since Azure Application Gateway WAF gives bot protection and lets you geo-filter, so it covers the requirements directly. NSGs and Traffic Manager aren’t built for app-level threats. Pretty sure about B. Agree?