exam questions

Exam DP-203 All Questions

View all questions & answers for the DP-203 exam

Exam DP-203 topic 3 question 15 discussion

Actual exam question from Microsoft's DP-203
Question #: 15
Topic #: 3
[All DP-203 Questions]

You are designing a security model for an Azure Synapse Analytics dedicated SQL pool that will support multiple companies.
You need to ensure that users from each company can view only the data of their respective company.
Which two objects should you include in the solution? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. a security policy
  • B. a custom role-based access control (RBAC) role
  • C. a predicate function
  • D. a column encryption key
  • E. asymmetric keys
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lukeonline
Highly Voted 3 years, 3 months ago
Selected Answer: AB
A and B
upvoted 21 times
...
alexleonvalencia
Highly Voted 3 years, 4 months ago
Selected Answer: AC
Respuesta A/C
upvoted 18 times
VJPR
3 years, 4 months ago
why not RBAC?
upvoted 6 times
sensaint
2 years, 4 months ago
Assuming RBAC is already in place, predicate function for row-level security would be next step. However, it's not clearly stated in question which makes it confusing.
upvoted 1 times
[Removed]
2 years, 1 month ago
That's why I went with AB instead because it wasn't mentioned. Therefore, we should assume that the system does not already have the RBAC already in place.
upvoted 6 times
...
dakku987
1 year, 4 months ago
see you can not add even row level security bcz you are saying some company will have access to some of its rows even that is not allowed AB
upvoted 1 times
...
...
Tapaskaro
1 year, 3 months ago
RBAC on storage, no impact on dedicated pool.
upvoted 1 times
...
...
...
7082935
Most Recent 9 months ago
Question is malformed. It does not indicate if all data resides in a single table or if each company has their own tables in the same database.
upvoted 4 times
...
slamcity
10 months, 1 week ago
Selected Answer: AC
both needed for RLS
upvoted 1 times
...
slamcity
11 months, 1 week ago
Selected Answer: AC
both are needed for RLS
upvoted 1 times
...
leenirs
11 months, 1 week ago
Selected Answer: AC
ChatGPT 4o: To ensure that users from each company can view only the data of their respective company in an Azure Synapse Analytics dedicated SQL pool, you should include the following objects in your solution: A. a security policy C. a predicate function Security Policy (A): A security policy in Azure Synapse Analytics is used to define the conditions under which access to data is granted. This can include row-level security (RLS) policies that control access to rows in a table based on the characteristics of the user executing a query. Predicate Function (C): A predicate function is used in conjunction with a security policy to enforce row-level security. The predicate function specifies the logic that determines whether a given row should be visible to a particular user. This function is often written as an inline table-valued function that checks user-specific attributes, such as their company affiliation, against the data in the table.
upvoted 1 times
...
Dusica
1 year ago
A and C
upvoted 2 times
...
Alongi
1 year ago
Selected Answer: AC
Sec Policy & Predicate Function
upvoted 2 times
...
mav2000
1 year, 2 months ago
Selected Answer: AC
Implement RLS by using the CREATE SECURITY POLICY Transact-SQL statement, and predicates created as inline table-valued functions therefore, answers are A and C https://learn.microsoft.com/en-us/sql/relational-databases/security/row-level-security?view=azure-sqldw-latest&preserve-view=true
upvoted 2 times
...
Azure_2023
1 year, 3 months ago
Selected Answer: AB
Despite their different purposes, security policies and custom RBAC roles share some common elements: Both are designed to protect data from unauthorized access. Both can be used to define permissions for users or groups of users. Both can be managed by administrators.
upvoted 2 times
...
JIOAOI
1 year, 3 months ago
AC - for sure
upvoted 2 times
...
jsav1
1 year, 3 months ago
Selected Answer: AB
A and B
upvoted 1 times
...
Momoanwar
1 year, 4 months ago
Selected Answer: AB
Chatgpt: If only two responses must be selected from the given options, based on the question asked, the two most relevant objects to ensure that users can view only the data of their respective company would be: A. **A security policy**: This would define the rules and conditions for data access based on company affiliation. B. **A custom role-based access control (RBAC) role**: This would allow for the assignment of specific access rights depending on the user's company. Even though a predicate function could be used as part of a security policy implementation, it is typically a component of such a policy, rather than a standalone object. Options D and E are related to encryption and are not directly used to control data views based on the user's company. Therefore, the two most appropriate answers, according to the question, would be A and B.
upvoted 2 times
...
MarkJoh
1 year, 4 months ago
Selected Answer: AC
Answer is A & C. Although as many have indicated, the steps are • Create the users or groups you want to isolate access. • Create the inline table-valued function that will filter the results based on the predicate defined. • Create a security policy for the table, assigning the function created above The first step may look like "objects"/option B but option B says "A custom role-based access control (RBAC) role. In reality, you would want to create a domain table with companyId and RoleName and create one Role per companyId. (Or maybe a set of roles per companyId depending on what the requirements are). Then the predicate function would use the meta data driven companyIdRoleName table.
upvoted 5 times
...
Shanuramasubbu
1 year, 5 months ago
Based on this MS doc, A&C is the right answer https://learn.microsoft.com/en-us/sql/relational-databases/security/row-level-security?view=azure-sqldw-latest&preserve-view=true
upvoted 2 times
...
y154707
1 year, 5 months ago
Question says: "Which two objects should you include in the solution?". It seems that answers A, B and C should be part of the solution, so any combination of the 3 should be ok in terms of a valid answer. If the question would asked for "the sequence of the first 2 steps required to achieve the goal" then the answer would be B => C => A.
upvoted 1 times
...
pperf
1 year, 7 months ago
It's A & C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago