Microsoft Certified: Fabric Data Engineer Associate (DP-700) Logo
Microsoft Logo

Microsoft Certified: Fabric Data Engineer Associate (DP-700) Exam Questions

133

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 11 Single Choice

You are a data engineer at Contoso Ltd., responsible for setting up an ingestion pipeline in Microsoft Fabric. The company wants to automate the data ingestion process using Data Factory pipelines.

You need to ensure that data is ingested into the bronze layer of a Fabric lakehouse using a no-code approach while also enabling source control for the pipeline. The ingestion must support Delta format, and if a failure occurs, the pipeline must retry the operation automatically.

What should you do?

Question 12 Single Choice

You are working on a data processing pipeline using Apache Spark and have a large dataset stored in a distributed file system. Your task involves performing a series of transformations and actions to clean, aggregate, and analyze the data. Considering the need for efficient execution, fault tolerance, and the ability to handle iterative algorithms,

Which of the following approaches would be most appropriate?

Question 13 Single Choice

You are developing a Spark-based data pipeline that processes a large dataset stored in a Delta Lake table. The pipeline must handle incremental updates efficiently, ensure ACID transactions, and allow schema evolution without manual intervention. Additionally, certain records need to be updated based on business rules before being written back to the Delta table. Considering performance, reliability, and maintainability,

which approach is most appropriate for handling updates in Spark?

Question 14 Single Choice

You are tasked with processing a large dataset containing user activity logs stored in a distributed file system. Each log entry includes a timestamp, user ID, action type, and additional metadata. To analyze user behavior over time, you need to calculate the total number of distinct actions performed by each user per day. Considering performance optimization and efficient resource utilization in Spark,

which approach would be most appropriate?

Question 15 Single Choice

You have a Spark SQL table named `employees` with columns: `employee_id`, `first_name`, `last_name`, `department`, and `salary`. To improve query performance, you decide to create a persistent view that shows only employees from the 'Sales' department with salaries above $50,000.

Which of the following commands would you use to create this view?

Question 16 Single Choice

In a Microsoft Fabric environment, an organization wants to enforce strict security controls so that only specific users can access datasets based on their assigned roles. The organization uses multiple workspaces and requires role-based access to govern data visibility efficiently.

Which of the following security mechanisms should be implemented to achieve this while maintaining scalability across different teams?

Question 17 Single Choice

A multinational corporation is implementing a data access strategy in Microsoft Fabric to ensure that employees can access only the data relevant to their roles. The IT team needs to configure security at a granular level to prevent unauthorized access to certain tables and columns while allowing appropriate users to query the data efficiently. They must also ensure that these security policies scale across multiple workspaces and datasets.

Which of the following approaches best aligns with their requirements?

Question 18 Single Choice

An enterprise wants to ensure that data access policies in Microsoft Fabric are enforced consistently while minimizing administrative overhead. They need a scalable approach to implement fine-grained security controls across datasets and workspaces, ensuring that employees see only the relevant data based on their roles. Additionally, they want to leverage security groups and minimize the number of individual permissions assignments to maintain manageability.

Which method should they prioritize?

Question 19 Single Choice

A data security administrator is tasked with securing access to a Fabric Lakehouse table containing sensitive customer records. The administrator must ensure that only employees in the “Finance” security group can view the Revenue column while all other users, including “Sales” and “Support” teams, should be restricted from accessing this column. Additionally, all users must be able to access the rest of the table for reporting purposes.

What is the best way to achieve this requirement in Microsoft Fabric?

Question 20 Single Choice

A data engineering team is setting up a CI/CD pipeline in Microsoft Fabric to automate deployment across multiple environments. They want to ensure that changes made in the development workspace are validated and automatically deployed to the test and production environments. Additionally, they need to maintain version control and rollback capabilities.

Which approach should they follow to achieve a structured and automated deployment process?

Page: 2 / 14