
Answer-first summary for fast verification
Answer: Enable Unity Catalog to centralize metadata management, create service principals for secure application access, implement role-based access control (RBAC) for fine-grained permissions, and enforce data security policies including encryption and data masking.
The most appropriate steps to create a secure and compliant data environment in Azure Databricks involve enabling Unity Catalog for unified metadata management, which is essential for data governance. Creating service principals is crucial for secure application access, as they provide a secure way to authenticate and authorize applications without exposing user credentials. Implementing RBAC allows for fine-grained access control, ensuring users and applications have only the permissions they need. Enforcing data security policies, such as encryption and data masking, protects sensitive data and ensures compliance with regulatory standards. This approach balances scalability, cost-effectiveness, and compliance, making it the best choice among the options provided.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
In the context of implementing data governance within an Azure Databricks workspace, you are required to ensure the environment is secure and compliant. The solution must leverage Unity Catalog for metadata management and service principals for secure access. Considering the need for scalability, cost-effectiveness, and adherence to compliance standards, which of the following steps is the MOST appropriate to achieve this goal? Choose the best option from the four provided.
A
Enable Unity Catalog to centralize metadata management, create service principals for secure application access, implement role-based access control (RBAC) for fine-grained permissions, and enforce data security policies including encryption and data masking.
B
Disable Unity Catalog to reduce complexity, create service principals for application access, configure access control lists (ACLs) for permissions, and apply basic data security measures.
C
Enable Unity Catalog for metadata management, create individual user accounts for each application access, use RBAC for permissions, and enforce comprehensive data security policies.
D
Disable Unity Catalog to minimize costs, create individual user accounts for all access needs, implement ACLs for permissions, and apply minimal data security policies to meet basic compliance.