
Answer-first summary for fast verification
Answer: Perform testing by impersonating users with different roles and permissions to verify access to specific data rows and objects, ensuring no unauthorized access is possible.
The correct approach is to perform testing by impersonating users with different roles and permissions (Option B). This method ensures that the row-level and object-level security measures are correctly implemented and functioning as intended, providing a realistic assessment of user access. Option A is insufficient because it does not test the semantic model's specific security measures. Option C neglects the critical step of validating security, which is essential for compliance and data privacy. Option D poses a significant risk by exposing sensitive data during development. Therefore, Option B is the best practice for validating security measures in a semantic model.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
As a Microsoft Fabric Analytics Engineer Associate, you are tasked with ensuring the security of a semantic model that includes both row-level and object-level security measures. The model is critical for a financial application where compliance and data privacy are paramount. You need to validate that the security measures are correctly implemented and functioning as intended. Considering the need for thorough testing without compromising data security during development, which of the following approaches should you take? (Choose one)
A
Conduct a comprehensive review of the security settings in the data source and assume the semantic model inherits these settings correctly.
B
Perform testing by impersonating users with different roles and permissions to verify access to specific data rows and objects, ensuring no unauthorized access is possible.
C
Skip detailed testing of security measures to save time, relying on the initial configuration to be accurate and secure.
D
Temporarily disable security measures during the development phase to facilitate easier testing and re-enable them before deployment.
No comments yet.