
Explanation:
Option D is the most appropriate because it addresses all the given requirements: security (through encryption), compliance (by adhering to industry-standard protocols), scalability (by using data pipelines that can handle large volumes of data), and cost-effectiveness (by efficiently utilizing resources). This comprehensive approach ensures that the sensitive data is securely transferred while also being prepared for future data growth and adhering to budget constraints.
Ultimate access to all questions.
No comments yet.
As a Microsoft Fabric Analytics Engineer, you are responsible for transferring sensitive data from a Fabric data source to a lakehouse. The organization mandates that the data transfer must comply with industry-standard security protocols, ensure data integrity, and be cost-effective. Additionally, the solution should be scalable to accommodate future data growth. Considering these requirements, which of the following methods would you choose to securely transfer the data? (Choose the best option.)
A
Utilize a data pipeline with encryption for secure data transfer, ensuring compliance with security protocols but without considering scalability and cost-effectiveness.
B
Implement a dataflow with built-in security features for handling sensitive data, focusing solely on data integrity without addressing scalability or compliance requirements.
C
Apply Fast Copy with additional security measures, prioritizing speed over compliance, scalability, and cost considerations.
D
Adopt a comprehensive approach by combining data pipelines for efficient data transfer, dataflows for processing, and notebooks for analysis, all with encryption to meet security, compliance, scalability, and cost-effectiveness requirements.