Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
How can you implement real-time threat detection for sensitive data streams in a lakehouse architecture to identify and mitigate potential security threats as data is ingested?
A
Utilize static rule-based threat detection models that trigger alerts based on predefined patterns of malicious activity.
B
Rely solely on network-level intrusion detection systems (IDS) to monitor and protect data inflow into the lakehouse.
C
Implement custom Spark Streaming jobs to parse and analyze incoming data streams for anomalies, using ML models trained on historical threat data.
D
Integrate a third-party, real-time threat detection system that analyzes data streams and automatically flags or blocks suspicious activities.