Questions and Answers

Question fRF0MEwnrHAXSCVbnp9l

Question

The view updates represents an incremental batch of all newly ingested data to be inserted or updated in the customers table. The following logic is used to process these records. //IMG//

Which statement describes this implementation?

Choices

  • A: The customers table is implemented as a Type 3 table; old values are maintained as a new column alongside the current value.
  • B: The customers table is implemented as a Type 2 table; old values are maintained but marked as no longer current and new values are inserted.
  • C: The customers table is implemented as a Type 0 table; all writes are append only with no changes to existing values.
  • D: The customers table is implemented as a Type 1 table; old values are overwritten by new values and no history is maintained.
  • E: The customers table is implemented as a Type 2 table; old values are overwritten and new customers are appended.

Question HJkfUgXEbtfYL5uSAtCS

Question

The DevOps team has configured a production workload as a collection of notebooks scheduled to run daily using the Jobs UI. A new data engineering hire is onboarding to the team and has requested access to one of these notebooks to review the production logic. What are the maximum notebook permissions that can be granted to the user without allowing accidental changes to production code or data?

Choices

  • A: Can Manage
  • B: Can Edit
  • C: No permissions
  • D: Can Read
  • E: Can Run

Question G7MJbo3Y2LPZpUZJfNoY

Question

A table named user_ltv is being used to create a view that will be used by data analysts on various teams. Users in the workspace are configured into groups, which are used for setting up data access using ACLs. The user_ltv table has the following schema: email STRING, age INT, ltv INT The following view definition is executed: //IMG//

An analyst who is not a member of the marketing group executes the following query:

SELECT * FROM email_ltv - Which statement describes the results returned by this query?

Choices

  • A: Three columns will be returned, but one column will be named “REDACTED” and contain only null values.
  • B: Only the email and ltv columns will be returned; the email column will contain all null values.
  • C: The email and ltv columns will be returned with the values in user_ltv.
  • D: The email.age, and ltv columns will be returned with the values in user_ltv.
  • E: Only the email and ltv columns will be returned; the email column will contain the string “REDACTED” in each row.

Question 8Eqa9Tpa5NBbw3hSArEx

Question

The data governance team has instituted a requirement that all tables containing Personal Identifiable Information (PH) must be clearly annotated. This includes adding column comments, table comments, and setting the custom table property “contains_pii” = true. The following SQL DDL statement is executed to create a new table: //IMG//

Which command allows manual confirmation that these three requirements have been met?

Choices

  • A: DESCRIBE EXTENDED dev.pii_test
  • B: DESCRIBE DETAIL dev.pii_test
  • C: SHOW TBLPROPERTIES dev.pii_test
  • D: DESCRIBE HISTORY dev.pii_test
  • E: SHOW TABLES dev

Question E1KUVy4e4WBWyVGVqha7

Question

The data governance team is reviewing code used for deleting records for compliance with GDPR. They note the following logic is used to delete records from the Delta Lake table named users. //IMG//

Assuming that user_id is a unique identifying key and that delete_requests contains all users that have requested deletion, which statement describes whether successfully executing the above logic guarantees that the records to be deleted are no longer accessible and why?

Choices

  • A: Yes; Delta Lake ACID guarantees provide assurance that the DELETE command succeeded fully and permanently purged these records.
  • B: No; the Delta cache may return records from previous versions of the table until the cluster is restarted.
  • C: Yes; the Delta cache immediately updates to reflect the latest data files recorded to disk.
  • D: No; the Delta Lake DELETE command only provides ACID guarantees when combined with the MERGE INTO command.
  • E: No; files containing deleted records may still be accessible with time travel until a VACUUM command is used to remove invalidated data files.