What should you recommend using to secure sensitive customer contact information?
What should you recommend using to secure sensitive customer contact information?A . data labelsB . column-level securityC . row-level securityD . Transparent Data Encryption (TDE)View AnswerAnswer: B Explanation: Scenario: All cloud data must be encrypted at rest and in transit. Always Encrypted is a feature designed to protect sensitive data...
Which type of table should you use for each table?
HOTSPOT You have a data model that you plan to implement in a data warehouse in Azure Synapse Analytics as shown in the following exhibit. All the dimension tables will be less than 2 GB after compression, and the fact table will be approximately 6 TB. Which type of table...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do?
You have an Azure Synapse Analytics job that uses Scala. You need to view the status of the job. What should you do?A . From Azure Monitor, run a Kusto query against the AzureDiagnostics table.B . From Azure Monitor, run a Kusto query against the SparkLogying1 Event.CL table.C . From...
Which table distribution will minimize query times?
You are designing a fact table named FactPurchase in an Azure Synapse Analytics dedicated SQL pool. The table contains purchases from suppliers for a retail store. FactPurchase will contain the following columns. FactPurchase will have 1 million rows of data added daily and will contain three years of data. Transact-SQL...
What should you recommend to prevent users outside the Litware on-premises network from accessing the analytical data store?
What should you recommend to prevent users outside the Litware on-premises network from accessing the analytical data store?A . a server-level virtual network ruleB . a database-level virtual network ruleC . a database-level firewall IP ruleD . a server-level firewall IP ruleView AnswerAnswer: A Explanation: Virtual network rules are one...
Which type of integration runtime should you use?
You need to integrate the on-premises data sources and Azure Synapse Analytics. The solution must meet the data integration requirements. Which type of integration runtime should you use?A . Azure-SSIS integration runtimeB . self-hosted integration runtimeC . Azure integration runtimeView AnswerAnswer: C
Which column should you add to the table?
You have a table in an Azure Synapse Analytics dedicated SQL pool. The table was created by using the following Transact-SQL statement. You need to alter the table to meet the following requirements: ✑ Ensure that users can identify the current manager of employees. ✑ Support creating an employee reporting...
Does this meet the goal?
You have an Azure Synapse Analytics dedicated SQL pool that contains a table named Table1. You have files that are ingested and loaded into an Azure Data Lake Storage Gen2 container named container1. You plan to insert data from the files into Table1 and azure Data Lake Storage Gen2 container...
Which type of library and workspace should you implement?
HOTSPOT You need to collect application metrics, streaming query events, and application log messages for an Azure Databrick cluster. Which type of library and workspace should you implement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: You...