You have an Azure SQL database that has masked columns. You need to identify when a user attempts to infer data from the masked columns. What should you use?
Suggested Answer:D🗳️
Dynamic Data Masking is designed to simplify application development by limiting data exposure in a set of pre-defined queries used by the application. While Dynamic Data Masking can also be useful to prevent accidental exposure of sensitive data when accessing a production database directly, it is important to note that unprivileged users with ad-hoc query permissions can apply techniques to gain access to the actual data. If there is a need to grant such ad-hoc access, Auditing should be used to monitor all database activity and mitigate this scenario. References: https://docs.microsoft.com/en-us/sql/relational-databases/security/dynamic-data-masking
While Dynamic Data Masking can also be useful to prevent accidental exposure of sensitive data when accessing a production database directly, it is important to note that unprivileged users with ad-hoc query permissions can apply techniques to gain access to the actual data. If there is a need to grant such ad-hoc access, Auditing should be used to monitor all database activity and mitigate this scenario.
It says "when a user attempts to infer" which is futuristic and not analysis of events that have occured. In that case I think it should be Advance Threat Detection and not Auditing.
Auditing only enables us to review the events that have happened before
Security Note: Bypassing masking using inference or brute-force techniques
Dynamic Data Masking is designed to simplify application development by limiting data exposure in a set of pre-defined queries used by the application. While Dynamic Data Masking can also be useful to prevent accidental exposure of sensitive data when accessing a production database directly, it is important to note that unprivileged users with ad-hoc query permissions can apply techniques to gain access to the actual data. If there is a need to grant such ad-hoc access, Auditing should be used to monitor all database activity and mitigate this scenario.
upvoted 8 times
...
This section is not available anymore. Please use the main Exam Page.DP-200 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
chatw
Highly Voted 5 years agovisakh
Highly Voted 5 years, 1 month agosri
Most Recent 4 years, 4 months agosyu31svc
4 years, 7 months agodumpsm42
4 years, 6 months agobrcdbrcd
4 years, 7 months agoAndrexx
4 years, 8 months agokilowd
4 years, 10 months ago