DP-600 Exam QuestionsBrowse all questions from this exam

DP-600 Exam - Question 137


You have a Fabric warehouse named Warehouse1 that contains a table named Table1. Table1 contains customer data.

You need to implement row-level security (RLS) for Table1. The solution must ensure that users can see only their respective data.

Which two objects should you create? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Show Answer
Correct Answer:

Discussion

4 comments
Sign in to comment
adaneOptions: DE
Dec 28, 2024

To implement RLS for Table1 in Fabric, create a FUNCTION to define row-filtering logic and a SECURITY POLICY to enforce it. This ensures users only see the rows they are permitted to access.

nappi1Options: AE
Dec 29, 2024

correct

zmeyaOptions: DE
Jan 4, 2025

From ChatGPT: The correct answer to implement Row-Level Security (RLS) on a table in Microsoft Fabric Warehouse is: D. FUNCTION E. SECURITY POLICY Explanation: FUNCTION (D): Used to define a security function that filters the rows of the table based on the user's identity or specific criteria. SECURITY POLICY (E): Applies the security function to the table to restrict access to rows according to the defined criteria. This ensures that users can only see the data they are authorized to query, meeting the RLS requirements.

5099e2dOptions: AD
Apr 19, 2025

To implement row-level security (RLS) for the Table1 in your Fabric warehouse (Warehouse1), ensuring that users can only see their respective data, the solution would typically involve the following objects: Correct Answers: A. DATABASE ROLE A DATABASE ROLE defines a group of users and their permissions. When implementing RLS, roles are often used to determine which users or groups of users have access to specific rows in the table. E. SECURITY POLICY A SECURITY POLICY is essential for enforcing row-level security. It allows you to filter rows in a table based on a predicate function, ensuring that users can only view the data they are authorized to access. Why Not FUNCTION: While functions (e.g., inline table-valued functions) might be involved in defining RLS filters, they are not the solution by themselves. Instead, they are used alongside SECURITY POLICY.