In a multi-user environment where SQL UDFs are extensively used for data transformation within Databricks notebooks, which strategy ensures that UDFs are securely shared and executed only by authorized users? | Databricks Certified Data Engineer - Professional Quiz - LeetQuiz