You have an Azure SQL database named DB1 that contains a table named Table1. Table1 has a field named Customer_ID that is varchar(22).
You need to implement masking for the Customer_ID field to meet the following requirements:
The first two prefix characters must be exposed.
The last four prefix characters must be exposed.
All other characters must be masked.
Solution: You implement data masking and use a credit card function mask.
Does this meet the goal?
Yes
No
Answer is No
Must use Custom Text data masking, which exposes the first and last characters and adds a custom padding string in the middle.
You have an Azure SQL database named DB1 that contains a table named Table1. Table1 has a field named Customer_ID that is varchar(22).
You need to implement masking for the Customer_ID field to meet the following requirements:
The first two prefix characters must be exposed.
The last four prefix characters must be exposed.
All other characters must be masked.
Solution: You implement data masking and use a random number function mask.
Does this meet the goal?
Yes
No
Answer is No
Must use Custom Text data masking, which exposes the first and last characters and adds a custom padding string in the middle.
You have an Azure SQL database named DB1 that contains a table named Table1. Table1 has a field named Customer_ID that is varchar(22).
You need to implement masking for the Customer_ID field to meet the following requirements:
The first two prefix characters must be exposed.
The last four prefix characters must be exposed.
All other characters must be masked.
Solution: You implement data masking and use a custom text mask.
Does this meet the goal?
Yes
No
Answer is Yes
We must use Custom Text data masking, which exposes the first and last characters and adds a custom padding string in the middle.
You have an Azure SQL database named DB1 that contains a table named Table1. Table1 has a field named Customer_ID that is varchar(22).
You need to implement masking for the Customer_ID field to meet the following requirements:
The first two prefix characters must be exposed.
The last four prefix characters must be exposed.
All other characters must be masked.
Solution: You implement data masking and use an email function mask.
Does this meet the goal?
Yes
No
Answer is No
Must use Custom Text data masking, which exposes the first and last characters and adds a custom padding string in the middle.
You have an Azure SQL database named DB1 that contains a table named Table1. Table1 has a field named Customer_ID that is varchar(22).
You need to implement masking for the Customer_ID field to meet the following requirements:
The first two prefix characters must be exposed.
The last four prefix characters must be exposed.
All other characters must be masked.
Solution: You implement data masking and use a custom string function mask.
Does this meet the goal?
Yes
No
Answer is No
Must use Custom Text data masking, which exposes the first and last characters and adds a custom padding string in the middle.
You plan to use Microsoft Azure SQL Database instances with strict user access control. A user object must:
Move with the database if it is run elsewhere
Be able to create additional users
You need to create the user object with correct permissions.
Which two Transact-SQL commands should you run?
ALTER LOGIN Mary WITH PASSWORD = 'strong_password';
CREATE LOGIN Mary WITH PASSWORD = 'strong_password';
ALTER ROLE db_owner ADD MEMBER Mary;
CREATE USER Mary WITH PASSWORD = 'strong_password';
GRANT ALTER ANY USER TO Mary;
ALTER ROLE adds or removes members to or from a database role, or changes the name of a user-defined database role.
Members of the db_owner fixed database role can perform all configuration and maintenance activities on the database, and can also drop the database in SQL Server.
CREATE USER adds a user to the current database.
Note: Logins are created at the server level, while users are created at the database level. In other words, a login allows you to connect to the SQL Server service (also called an instance), and permissions inside the database are granted to the database users, not the logins. The logins will be assigned to server roles (for example, serveradmin) and the database users will be assigned to roles within that database (eg. db_datareader, db_bckupoperator).
You have an Azure SQL server named Server1 that hosts two development databases named DB1 and DB2.
You have an administrative workstation that has an IP address of 192.168.8.8. The development team at your company has an IP addresses in the range of 192.168.8.1 to 192.168.8.5.
You need to set up firewall rules to meet the following requirements:
Allows connection from your workstation to both databases.
The development team must be able connect to DB1 but must be prevented from connecting to DB2.
Web services running in Azure must be able to connect to DB1 but must be prevented from connecting to DB2.
Which three actions should you perform?
Create a firewall rule on DB1 that has a start IP address of 192.168.8.1 and an end IP address of 192.168.8.5.
Create a firewall rule on DB1 that has a start and end IP address of 0.0.0.0.
Create a firewall rule on Server1 that has a start IP address of 192.168.8.1 and an end IP address of 192.168.8.5.
Create a firewall rule on DB1 that has a start and end IP address of 192.168.8.8.
Create a firewall rule on Server1 that has a start and end IP address of 192.168.8.8.
Answers are;
Create a firewall rule on DB1 that has a start IP address of 192.168.8.1 and an end IP address of 192.168.8.5.
Create a firewall rule on Server1 that has a start IP address of 192.168.8.1 and an end IP address of 192.168.8.5.
Create a firewall rule on Server1 that has a start and end IP address of 192.168.8.8.
Question 228
Your company manages a payroll application for its customers worldwide. The application uses an Azure SQL database named DB1. The database contains a table named Employee and an identity column named EmployeeId.
A customer requests the EmployeeId be treated as sensitive data.
Whenever a user queries EmployeeId, you need to return a random value between 1 and 10 instead of the EmployeeId value.
You have an Azure SQL database that contains a table named Customer. Customer contains the columns shown in the following table.
You apply a masking rule as shown in the following table.
Which users can view the email addresses of the customers?
Server administrators and all users who are granted the UNMASK permission to the Customer_Email column only. Most Voted
All users who are granted the UNMASK permission to the Customer_Email column only.
Server administrators only.
Server administrators and all users who are granted the SELECT permission to the Customer_Email column only.
Answer is All users who are granted the UNMASK permission to the Customer_Email column only.
Grant the UNMASK permission to a user to enable them to retrieve unmasked data from the columns for which masking is defined.
You need to ensure that Azure Data Factory pipelines can be deployed.
How should you configure authentication and authorization for deployments?
A-A
A-B
A-C
B-B
B-C
B-D
C-C
D-D
Answer is A - A
The way you control access to resources using RBAC is to create role assignments. This is a key concept to understand – it’s how permissions are enforced. A role assignment consists of three elements: security principal, role definition, and scope.
Scenario:
No credentials or secrets should be used during deployments
Phone-based poll data must only be uploaded by authorized users from authorized devices
Contractors must not have access to any polling data other than their own Access to polling data must set on a per-active directory user basis