Certified Data Engineer Professional Exam QuestionsBrowse all questions from this exam

Certified Data Engineer Professional Exam - Question 46


Although the Databricks Utilities Secrets module provides tools to store sensitive credentials and avoid accidentally displaying them in plain text users should still be careful with which credentials are stored here and which users have access to using these secrets.

Which statement describes a limitation of Databricks Secrets?

Show Answer
Correct Answer: DE

The Databricks REST API can indeed be used to list secrets in plain text if the personal access token has proper credentials. This means that the security of the secrets is dependent not only on how they are stored but also on the security of the access tokens and the permissions assigned to them. This presents a potential security risk if a personal access token is compromised, which aligns with the limitations described in the question.

Discussion

17 comments
Sign in to comment
hkayOption: E
Dec 29, 2023

Answer is E: /api/2.0/secrets/get { "key": "string", "value": "string" } The REST API can potentially expose secrets in plain text if a user with appropriate permissions (including access to both secrets/list and secrets/get) uses a personal access token.

DAN_HOption: D
Feb 2, 2024

D is correct

CrocjunOption: E
Oct 22, 2023

could be E reference: https://docs.databricks.com/api/workspace/secrets

Hannah_13Option: D
Nov 2, 2023

Answer is D based on Udemy practice test

AzureDE2522Option: E
Nov 5, 2023

E is the correct answer because it describes a limitation of Databricks Secrets. Databricks Secrets is a module that provides tools to store sensitive credentials and avoid accidentally displaying them in plain text. Databricks Secrets allows creating secret scopes, which are collections of secrets that can be accessed by users or groups. Databricks Secrets also allows creating and managing secrets using the Databricks CLI or the Databricks REST API. However, a limitation of Databricks Secrets is that the Databricks REST API can be used to list secrets in plain text if the personal access token has proper credentials. Therefore, users should still be careful with which credentials are stored in Databricks Secrets and which users have access to using these secrets.

aragorn_bregoOption: E
Nov 21, 2023

While Databricks Secrets are designed to secure sensitive information such as passwords and tokens, one limitation is that if a user's personal access token is compromised, and that token has the necessary permissions, the REST API could potentially be used to retrieve secrets. This means that the security of secrets is also dependent on the security of personal access tokens and the permissions assigned to them.

PatitoOption: D
Dec 29, 2023

Iterating through the secrets provides a way to see the secret's password.

Jay_98_11Option: D
Jan 13, 2024

For sure it's D

spaceexplorerOption: D
Jan 26, 2024

D is correct

guillesdOption: D
Feb 7, 2024

D is for sure correct (tried it several times on a Databricks environment).

guillesd
Feb 7, 2024

Regarding E, it can list secrets (with scopes) but I am not sure it can list secret contents.

PrashantTiwariOption: D
Feb 9, 2024

D is correct

Lucario95Option: E
Feb 24, 2024

Both D and E seems correct. They are poorly written thought because for D just printing the characters (not separated by spaces, newlines or something) would not work, while E if launched inside databricks workspace would not work neither.

Er5Option: D
Apr 12, 2024

E: https://docs.databricks.com/api/azure/workspace/secrets/listsecrets GET /api/2.0/secrets/list won’t list secrets in plain text. D: if print it without iterating it in a for loop the output is kind of encrypted where it is showing [REDACTED]. But, if I do it as shown in the screenshot, I'm able to see the value of the secret key. https://community.databricks.com/t5/data-engineering/how-to-avoid-databricks-secret-scope-from-exposing-the-value-of/td-p/12254 https://docs.databricks.com/en/security/secrets/redaction.html Secret redaction for notebook cell output applies only to literals. The secret redaction functionality does not prevent deliberate and arbitrary transformations of a secret literal.

EnduresoulOption: D
Nov 25, 2023

D is correct, see https://community.databricks.com/t5/data-engineering/how-to-avoid-databricks-secret-scope-from-exposing-the-value-of/td-p/12254/page/2

hkay
Dec 29, 2023

you didn't read the entire document, they are also using the get api to print the secret.

ranith
Jan 14, 2024

B and E both seems to be correct: https://community.databricks.com/t5/data-engineering/how-to-avoid-databricks-secret-scope-from-exposing-the-value-of/td-p/12254/page/2

Def21Option: E
Jan 24, 2024

At least E is a correct answer. B: You can't see secrets in Admin console. Only via REST API, CLI etc. C: Secrets are. not stored in Hive Metastore. D: I am not sure if iterating through secret character by character would work? E: This is at least correct. Using this.

coercionOption: E
May 20, 2024

Only through REST API or CLI you can fetch the secret if you have valid token