
Answer-first summary for fast verification
Answer: Create a shared library in a central location accessible by all users, enabling them to access the UDF without individual file distribution., Register the UDF in a central registry accessible by all users, providing a standardized method for UDF sharing.
Option B is the correct answer as it describes creating a shared library in a central location, which is a secure and efficient way to share SQL UDFs without distributing files directly to users. Option D is also correct as registering the UDF in a central registry provides a standardized and secure method for sharing, making it the second correct answer when E is available. Option A is incorrect due to security and compliance risks associated with direct file sharing. Option C is incorrect as it may not scale well and poses security risks by granting direct file system access. Option E is included to test the understanding that both centralized sharing methods (B and D) are viable under different scenarios.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
In a Spark SQL environment, you are tasked with sharing a SQL UDF (User-Defined Function) across multiple users while ensuring security and ease of access. The solution must comply with organizational policies that restrict direct file sharing and require centralized access control. Considering these constraints, which of the following options best describes the security model for sharing SQL UDFs? Choose the best option.
A
Distribute the JAR file containing the UDF implementation directly to all users, bypassing centralized controls for simplicity.
B
Create a shared library in a central location accessible by all users, enabling them to access the UDF without individual file distribution.
C
Grant each user explicit file system permissions to the UDF's location, ensuring they can access it directly.
D
Register the UDF in a central registry accessible by all users, providing a standardized method for UDF sharing.
E
Both B and D are correct, offering secure and centralized methods for UDF sharing.