ExamGecko
Home Home / Microsoft / DP-203

Microsoft DP-203 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure Synapse Analytics dedicated SQL pool.

You need to ensure that data in the pool is encrypted at rest. The solution must NOT require modifying applications that query the data. What should you do?

A.
Enable encryption at rest for the Azure Data Lake Storage Gen2 account.
A.
Enable encryption at rest for the Azure Data Lake Storage Gen2 account.
Answers
B.
Enable Transparent Data Encryption (TDE) for the pool.
B.
Enable Transparent Data Encryption (TDE) for the pool.
Answers
C.
Use a customer-managed key to enable double encryption for the Azure Synapse workspace.
C.
Use a customer-managed key to enable double encryption for the Azure Synapse workspace.
Answers
D.
Create an Azure key vault in the Azure subscription grant access to the pool.
D.
Create an Azure key vault in the Azure subscription grant access to the pool.
Answers
Suggested answer: B

Explanation:

Transparent Data Encryption (TDE) helps protect against the threat of malicious activity by encrypting and decrypting your data at rest. When you encrypt your database, associated backups and transaction log files are encrypted without requiring any changes to your applications. TDE encrypts the storage of an entire database by using a symmetric key called the database encryption key.

Reference: https://docs.microsoft.com/en-us/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-manage-security

You plan to create an Azure Synapse Analytics dedicated SQL pool. You need to minimize the time it takes to identify queries that return confidential information as defined by the company's data privacy regulations and the users who executed the queues. Which two components should you include in the solution? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.
sensitivity-classification labels applied to columns that contain confidential information
A.
sensitivity-classification labels applied to columns that contain confidential information
Answers
B.
resource tags for databases that contain confidential information
B.
resource tags for databases that contain confidential information
Answers
C.
audit logs sent to a Log Analytics workspace
C.
audit logs sent to a Log Analytics workspace
Answers
D.
dynamic data masking for columns that contain confidential information
D.
dynamic data masking for columns that contain confidential information
Answers
Suggested answer: A, C

Explanation:

A: You can classify columns manually, as an alternative or in addition to the recommendation-based classification:

Select Add classification in the top menu of the pane.

In the context window that opens, select the schema, table, and column that you want to classify, and the information type and sensitivity label. Select Add classification at the bottom of the context window.

C: An important aspect of the information-protection paradigm is the ability to monitor access to sensitive data. Azure SQL Auditing has been enhanced to include a new field in the audit log called data_sensitivity_information. This field logs the sensitivity classifications (labels) of the data that was returned by a query. Here's an example:

Reference:

https://docs.microsoft.com/en-us/azure/azure-sql/database/data-discovery-and-classification-overview

You are designing an enterprise data warehouse in Azure Synapse Analytics that will contain a table named Customers. Customers will contain credit card information. You need to recommend a solution to provide salespeople with the ability to view all the entries in Customers. The solution must prevent all the salespeople from viewing or inferring the credit card information. What should you include in the recommendation?

A.
data masking
A.
data masking
Answers
B.
Always Encrypted
B.
Always Encrypted
Answers
C.
column-level security
C.
column-level security
Answers
D.
row-level security
D.
row-level security
Answers
Suggested answer: A

Explanation:

SQL Database dynamic data masking limits sensitive data exposure by masking it to non-privileged users. The Credit card masking method exposes the last four digits of the designated fields and adds a constant string as a prefix in the form of a credit card. Example: XXXX-XXXX-XXXX-1234

Reference: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-dynamic-data-masking-get-started

You develop data engineering solutions for a company.

A project requires the deployment of data to Azure Data Lake Storage. You need to implement role-based access control (RBAC) so that project members can manage the Azure Data Lake Storage resources. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.
Create security groups in Azure Active Directory (Azure AD) and add project members.
A.
Create security groups in Azure Active Directory (Azure AD) and add project members.
Answers
B.
Configure end-user authentication for the Azure Data Lake Storage account.
B.
Configure end-user authentication for the Azure Data Lake Storage account.
Answers
C.
Assign Azure AD security groups to Azure Data Lake Storage.
C.
Assign Azure AD security groups to Azure Data Lake Storage.
Answers
D.
Configure Service-to-service authentication for the Azure Data Lake Storage account.
D.
Configure Service-to-service authentication for the Azure Data Lake Storage account.
Answers
E.
Configure access control lists (ACL) for the Azure Data Lake Storage account.
E.
Configure access control lists (ACL) for the Azure Data Lake Storage account.
Answers
Suggested answer: A, C, E

Explanation:

AC: Create security groups in Azure Active Directory. Assign users or security groups to Data Lake Storage Gen1 accounts. E: Assign users or security groups as ACLs to the Data Lake Storage Gen1 file system

Reference: https://docs.microsoft.com/en-us/azure/data-lake-store/data-lake-store-secure-data

You have an Azure Data Factory version 2 (V2) resource named Df1. Df1 contains a linked service. You have an Azure Key vault named vault1 that contains an encryption key named key1. You need to encrypt Df1 by using key1.

What should you do first?

A.
Add a private endpoint connection to vaul1.
A.
Add a private endpoint connection to vaul1.
Answers
B.
Enable Azure role-based access control on vault1.
B.
Enable Azure role-based access control on vault1.
Answers
C.
Remove the linked service from Df1.
C.
Remove the linked service from Df1.
Answers
D.
Create a self-hosted integration runtime.
D.
Create a self-hosted integration runtime.
Answers
Suggested answer: C

Explanation:

Linked services are much like connection strings, which define the connection information needed for Data Factory to connect to external resources.

Incorrect Answers:

D: A self-hosted integration runtime copies data between an on-premises store and cloud storage.

Reference: https://docs.microsoft.com/en-us/azure/data-factory/enable-customer-managed-key https://docs.microsoft.com/en-us/azure/data-factory/concepts-linked-services https://docs.microsoft.com/en-us/azure/data-factory/create-self-hosted-integration-runtime

You are designing an Azure Synapse Analytics dedicated SQL pool. You need to ensure that you can audit access to Personally Identifiable Information (PII). What should you include in the solution?

A.
column-level security
A.
column-level security
Answers
B.
dynamic data masking
B.
dynamic data masking
Answers
C.
row-level security (RLS)
C.
row-level security (RLS)
Answers
D.
sensitivity classifications
D.
sensitivity classifications
Answers
Suggested answer: D

Explanation:

Data Discovery & Classification is built into Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics. It provides basic capabilities for discovering, classifying, labeling, and reporting the sensitive data in your databases.

Your most sensitive data might include business, financial, healthcare, or personal information. Discovering and classifying this data can play a pivotal role in your organization's information-protection approach. It can serve as infrastructure for:

Helping to meet standards for data privacy and requirements for regulatory compliance. Various security scenarios, such as monitoring (auditing) access to sensitive data. Controlling access to and hardening the security of databases that contain highly sensitive data.

Reference:

https://docs.microsoft.com/en-us/azure/azure-sql/database/data-discovery-and-classification-overview

You have a data warehouse in Azure Synapse Analytics.

You need to ensure that the data in the data warehouse is encrypted at rest. What should you enable?

A.
Advanced Data Security for this database
A.
Advanced Data Security for this database
Answers
B.
Transparent Data Encryption (TDE)
B.
Transparent Data Encryption (TDE)
Answers
C.
Secure transfer required
C.
Secure transfer required
Answers
D.
Dynamic Data Masking
D.
Dynamic Data Masking
Answers
Suggested answer: B

Explanation:

Azure SQL Database currently supports encryption at rest for Microsoft-managed service side and client-side encryption scenarios. Support for server encryption is currently provided through the SQL feature called Transparent Data Encryption. Client-side encryption of Azure SQL Database data is supported through the Always Encrypted feature.

Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest

You are designing a streaming data solution that will ingest variable volumes of data. You need to ensure that you can change the partition count after creation. Which service should you use to ingest the data?

A.
Azure Event Hubs Dedicated
A.
Azure Event Hubs Dedicated
Answers
B.
Azure Stream Analytics
B.
Azure Stream Analytics
Answers
C.
Azure Data Factory
C.
Azure Data Factory
Answers
D.
Azure Synapse Analytics
D.
Azure Synapse Analytics
Answers
Suggested answer: B

You are designing a date dimension table in an Azure Synapse Analytics dedicated SQL pool. The date dimension table will be used by all the fact tables. Which distribution type should you recommend to minimize data movement?

A.
HASH
A.
HASH
Answers
B.
REPLICATE
B.
REPLICATE
Answers
C.
ROUND_ROBIN
C.
ROUND_ROBIN
Answers
Suggested answer: B

Explanation:

A replicated table has a full copy of the table available on every Compute node. Queries run fast on replicated tables since joins on replicated tables don't require data movement. Replication requires extra storage, though, and isn't practical for large tables.

Incorrect Answers:

A: A hash distributed table is designed to achieve high performance for queries on large tables. C: A round-robin table distributes table rows evenly across all distributions. The rows are distributed randomly. Loading data into a round-robin table is fast. Keep in mind that queries can require more data movement than the other distribution methods.

Reference:

https://docs.microsoft.com/en-us/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-tables-overview

You are designing a security model for an Azure Synapse Analytics dedicated SQL pool that will support multiple companies. You need to ensure that users from each company can view only the data of their respective company. Which two objects should you include in the solution? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.
a security policy
A.
a security policy
Answers
B.
a custom role-based access control (RBAC) role
B.
a custom role-based access control (RBAC) role
Answers
C.
a function
C.
a function
Answers
D.
a column encryption key
D.
a column encryption key
Answers
E.
asymmetric keys
E.
asymmetric keys
Answers
Suggested answer: A, B

Explanation:

A: Row-Level Security (RLS) enables you to use group membership or execution context to control access to rows in a database table. Implement RLS by using the CREATE SECURITY POLICYTransact-SQL statement. B: Azure Synapse provides a comprehensive and fine-grained access control system, that integrates:

Azure roles for resource management and access to data in storage, Synapse roles for managing live access to code and execution, SQL roles for data plane access to data in SQL pools.

Reference: https://docs.microsoft.com/en-us/sql/relational-databases/security/row-level-security https://docs.microsoft.com/en-us/azure/synapse-analytics/security/synapse-workspace-access-control-overview

Total 320 questions
Go to page: of 32