
Ultimate access to all questions.
Deep dive into the quiz with AI chat providers.
We prepare a focused prompt with your quiz and certificate details so each AI can offer a more tailored, in-depth explanation.
A new data engineer has started at a company. The data engineer has recently been added to the company’s Databricks workspace as new.engineer@company.com. The data engineer needs to be able to query the table sales in the database retail. The new data engineer already has been granted USAGE on the database retail.
Which of the following commands can be used to grant the appropriate permissions to the new data engineer?
Context / important info:
Database: retail
Table: sales
User: new.engineer@company.com
The user already has: USAGE on DATABASE retail
You may assume standard Databricks SQL privileges syntax is used (GRANT ... ON TABLE ... TO ...).
Note: Do not include the answer options in this field.
A
GRANT USAGE ON TABLE sales TO new.engineer@company.com;
B
GRANT CREATE ON TABLE sales TO new.engineer@company.com;
C
GRANT SELECT ON TABLE sales TO new.engineer@company.com;
D
GRANT USAGE ON TABLE new.engineer@company.com TO sales;
E
GRANT SELECT ON TABLE new.engineer@company.com TO sales;
Explanation:
To allow the data engineer to query (read) the table sales, you must grant the SELECT privilege on that table to the user. USAGE on the database allows the user to see and reference objects in the database but does not allow reading table data. CREATE on the table is not appropriate because it grants ability to create new objects, not read data. Options D and E are syntactically incorrect because the object and principal are reversed (GRANT ... ON TABLE <object> TO <principal>). The correct SQL command is: GRANT SELECT ON TABLE retail.sales TO new.engineer@company.com; If the username contains special characters (such as @), quoting or using the identity as a principal in Databricks may require backticks or using the user or group identifier as configured. This answer falls under "Data Governance" because it concerns privileges and access control.