This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
What is the primary advantage of Dynamic Data Masking (DDM)?
It limits data exposure by obscuring sensitive information in real time.
It changes the actual data in the database.
It requires complex coding to implement.
What is the purpose of a security predicate function in Row-Level Security (RLS)?
It determines whether a row is accessible to a user based on certain conditions.
It enables type conversions in predicate functions.
It allows users to run ad hoc queries.
What happens when a user is granted a permission and then denied the same permission in a warehouse?
The GRANT statement supersedes the DENY, and the user will have access to the specific object.
The DENY always supersedes the GRANT, and the user is denied access to the specific object.
The user has both permissions, and it causes a conflict.
You must answer all questions before checking your work.
Was this page helpful?