Azure Flashcards

1
Q

Elements of the Control Plane

A
Web App
Jobs Manager
Notebooks
Metastore
Cluster Manager
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elements of the Data Plane

A

Clusters

NGrok Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What ‘features’ protect the frontend webapp?

A

SSO
SCIM
IP Access-Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is BYO VNET?

A

The ability for customers to specify there own VNET details in Azure. Can be singular per workspace (for Data Isolation), or shared between multiple workspaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would you use VNET Peering?

A

VNET peering allows the cluster nodes to peer with data sources in other customer owned VNETs. This means data traverses over the MSFT backbone not the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does SCIM stand for?

A

System for Cross Domain Identity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you configure SCIM with Databricks?

A

No clue - Update later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are we referring to with “Identity & Access Management”?

A

Identity (user names), using local accounts, or single sign-on using identity providers (Idp)

Provisioning/Deprovisioning -> SCIM.

Access Control Lists (ACLs) - RBAC - (View,Create,Manage,AttachRun,Delete) on Control Plane Objects

Token Management API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two Azure specific IAM methods

A

Service Principals (used for applications, hosted services, automated tools)

Conditional Access (Where & When access is granted), MFA, Device, Patch Level etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What ‘features’ can be used for Data Protection

A

Data Access Control
Encryption
Table Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What feature of Data Access Control allows multiple Idps to be used for authentication and authorisation?

A

Federated Identity

Called ‘full user identity federation’ in docs - but… I think its just Federated ID (login using google,facebook,etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What feature of Data Access provides seemless access to customers Lake Storage using same login as webapp

A

Active Directory Credential Passthrough.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where do you enable ADLS Credential Pass-through?

A

On the Cluster Properties (under Advanced Options)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What needs to happen before Table Access Control can be used?

A

It needs to be enabled on the cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What objects can you control with Table Access Control?

A
CATALOG
DATABASE
TABLE
VIEW
FUNCTION
ANAONYMOUS FUNCTION
ANY FILE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What privileges can be granted to Table Access Control Objects?

A
SELECT
CREATE
MODIFY
READ_METADATA
CREATE_NAMED_FUNCTION
ANONYMOUS FUNCTION
ALL_PRIVILEGES
17
Q

What is the default configuration for table access control

A

Disabled - All users can access all ‘MANAGED’ tables

18
Q

What languages can be used for granting permissions when using table access control ?

A

Python & SQL

19
Q

How is Data in transit secured

A

TLS is used for all comms in the control plane, and within the data plane using ‘server-side’ encryption.

20
Q

Who owns the certificates for Encryption in transit

A

DONT KNOW - FIND OUT

21
Q

What types of traffic traverse between control & Data Plane

A
Commands
Queries
Results
Table metadata
Log Information
22
Q

Who is responsible (client or server) for encryption at rest

A

Server-side (so done by MSFT) by default. Silvio has said client-side encryption is possible.