Multiple Choice Questions - Row Level Security
1. With Row-Level Security, an organisation can create a security policy that allows employees of different departments to view data for their own department only.
2. We implement Row-Level Security by using the . . . . . .
A) CREATE ROW-LEVEL POLICY
B) CREATE SECURITY POLICY
C) CREATE ROW-LEVEL SECURITY
D) None of above
3. Row-Level Security affects following operations:
A) SELECT, UPDATE, and DELETE
B) AFTER INSERT, BEFORE DELETE
C) AFTER UPDATE, BEFORE UPDATE
D) All of above
4. If a query is run against a table by the table owner and that table has a security policy defined and enabled then . . . . . . .
A) the resultant rows are filtered as defined by the security policy.
B) the resultant rows are blocked as defined by the security policy.
C) the resultant rows are filtered or blocked as defined by the security policy.
D) the resultant rows are not filtered or blocked.
5. Security policies can be created on top of views, and views can be created on top of tables that are bound by security policies.
6. The access restriction logic is located in the . . . . .
A) application tier
B) database tier
C) presentation tier
D) None of above
7. Defining multiple active security policies that contain non-overlapping predicates . . . . .
A) is not possible on a table
B) is possible
8. Indexed views . . . . . created on top of tables that have a security policy.
A) cannot be
B) can be
9. Creating, altering, or dropping security policies requires the . . . . . permission.
A) ALTER ROW LEVEL POLICY
B) ALTER SECURITY POLICY
C) ALTER ANY SECURITY POLICY
D) ALTER RLS POLICY
10. RLS is . . . . . . with both clustered and non-clustered columnstore indexes.
1) a, 2) b, 3) d, 4) c, 5) a, 6)b , 7) b, 8) a, 9) c, 10) b