Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

How can a Snowflake administrator determine which user has accessed a database object that contains sensitive information?

A.

Review the granted privileges to the database object.

B.

Review the row access policy for the database object.

C.

Query the ACCESS_HlSTORY view in the ACCOUNT_USAGE schema.

D.

Query the REPLICATION USAGE HISTORY view in the ORGANIZATION USAGE schema.

Full Access
Question # 5

Who can activate and enforce a network policy for all users in a Snowflake account? (Select TWO).

A.

A user with an USERADMIN or higher role

B.

A user with a SECURITYADMIN or higher role

C.

A role that has been granted the ATTACH POLICY privilege

D.

A role that has the NETWORK_POLlCY account parameter set

E.

A role that has the ownership of the network policy

Full Access
Question # 6

Which Snowflake view is used to support compliance auditing?

A.

ACCESS_HISTORY

B.

COPY_HISTORY

C.

QUERY_HISTORY

D.

ROW ACCESS POLICIES

Full Access
Question # 7

Which solution improves the performance of point lookup queries that return a small number of rows from large tables using highly selective filters?

A.

Automatic clustering

B.

Materialized views

C.

Query acceleration service

D.

Search optimization service

Full Access
Question # 8

At what level is the MIN_DATA_RETENTION_TIME_IN_DAYS parameter set?

A.

Account

B.

Database

C.

Schema

D.

Table

Full Access
Question # 9

How is unstructured data retrieved from data storage?

A.

SQL functions like the GET command can be used to copy the unstructured data to a location on the client.

B.

SQL functions can be used to create different types of URLs pointing to the unstructured data. These URLs can be used to download the data to a client.

C.

SQL functions can be used to retrieve the data from the query results cache. When the query results are output to a client, the unstructured data will be output to the client as files.

D.

SQL functions can call on different web extensions designed to display different types of files as a web page. The web extensions will allow the files to be downloaded to the client.

Full Access
Question # 10

What is the minimum Snowflake Edition that supports secure storage of Protected Health Information (PHI) data?

A.

Standard Edition

B.

Enterprise Edition

C.

Business Critical Edition

D.

Virtual Private Snowflake Edition

Full Access
Question # 11

Which function unloads data from a relational table to JSON?

A.

TO_OBJECT

B.

TO_JSON

C.

TO_VARIANT

D.

OBJECT CONSTRUCT

Full Access
Question # 12

Which Snowflake object does not consume any storage costs?

A.

Secure view

B.

Materialized view

C.

Temporary table

D.

Transient table

Full Access
Question # 13

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.

Bytes scanned

B.

Bytes written to result

C.

Partitions scanned

D.

Partitions total

E.

Percentage scanned from cache

Full Access
Question # 14

How can performance be optimized for a query that returns a small amount of data from a very large base table?

A.

Use clustering keys

B.

Create materialized views

C.

Use the search optimization service

D.

Use the query acceleration service

Full Access
Question # 15

Which command is used to unload data from a Snowflake database table into one or more files in a Snowflake stage?

A.

CREATE STAGE

B.

COPY INTO

C.

COPY INTO

D.

CREATE PIPE

Full Access
Question # 16

While working with unstructured data, which file function generates a Snowflake-hosted file URL to a staged file using the stage name and relative file path as inputs?

A.

GET_PRESIGNED_URL

B.

GET_ABSOLUTE_PATH

C.

BUILD_STAGE_FILE_URL

D.

BUILD SCOPED FILE URL

Full Access
Question # 17

A user with which privileges can create or manage other users in a Snowflake account? (Select TWO).

A.

GRANT

B.

SELECT

C.

MODIFY

D.

OWNERSHIP

E.

CREATE USER

Full Access
Question # 18

In the Data Exchange, who can get or request data from the listings? (Select TWO).

A.

Users with ACCOUNTADMIN role

B.

Users with sysadmin role

C.

Users with ORGADMIN role

D.

Users with import share privilege

E.

Users with manage grants privilege

Full Access
Question # 19

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.

SELECT

B.

OWNERSHIP

C.

MONITOR

D.

MODIFY

E.

USAGE

Full Access
Question # 20

Which categories are included in the execution time summary in a Query Profile? (Select TWO).

A.

Pruning

B.

Spilling

C.

Initialization

D.

Local Disk I/O

E.

Percentage of data read from cache

Full Access
Question # 21

What happens to the privileges granted to Snowflake system-defined roles?

A.

The privileges cannot be revoked.

B.

The privileges can be revoked by an ACCOUNTADMIN.

C.

The privileges can be revoked by an orgadmin.

D.

The privileges can be revoked by any user-defined role with appropriate privileges.

Full Access
Question # 22

Which command is used to start configuring Snowflake for Single Sign-On (SSO)?

A.

CREATE SESSION POLICY

B.

CREATE NETWORK RULE

C.

CREATE SECURITY INTEGRATION

D.

CREATE PASSWORD POLICY

Full Access
Question # 23

Which Snowflake feature allows administrators to identify unused data that may be archived or deleted?

A.

Access history

B.

Data classification

C.

Dynamic Data Masking

D.

Object tagging

Full Access
Question # 24

What are key characteristics of virtual warehouses in Snowflake? (Select TWO).

A.

Warehouses that are multi-cluster can have nodes of different sizes.

B.

Warehouses can be started and stopped at any time.

C.

Warehouses can be resized at any time, even while running.

D.

Warehouses are billed on a per-minute usage basis.

E.

Warehouses can only be used for querying and cannot be used for data loading.

Full Access
Question # 25

Which Snowflake function will parse a JSON-null into a SQL-null?

A.

TO_CHAR

B.

TO_VARIANT

C.

TO_VARCHAR

D.

STRIP NULL VALUE

Full Access
Question # 26

What is the purpose of the Snowflake SPLIT TO_TABLE function?

A.

To count the number of characters in a string

B.

To split a string into an array of sub-strings

C.

To split a string and flatten the results into rows

D.

To split a string and flatten the results into columns

Full Access
Question # 27

Who can grant object privileges in a regular schema?

A.

Object owner

B.

Schema owner

C.

Database owner

D.

SYSADMIN

Full Access
Question # 28

Which VALIDATION_MODE value will return the errors across the files specified in a COPY command, including files that were partially loaded during an earlier load?

A.

RETURN_-1_R0WS

B.

RETURN_n_ROWS

C.

RETURN_ERRORS

D.

RETURN ALL ERRORS

Full Access
Question # 29

Which feature of Snowflake's Continuous Data Protection (CDP) has associated costs?

A.

Fail-safe

B.

Network policies

C.

End-to-end encryption

D.

Multi-Factor Authentication (MFA)

Full Access
Question # 30

Which typos of charts does Snowsight support? (Select TWO).

A.

Area charts

B.

Bar charts

C.

Column charts

D.

Radar charts

E.

Scorecards

Full Access
Question # 31

Which type of role can be granted to a share?

A.

Account role

B.

Custom role

C.

Database role

D.

Secondary role

Full Access
Question # 32

How does the Access_History view enhance overall data governance pertaining to read and write operations? (Select TWO).

A.

Shows how the accessed data was moved from the source lo the target objects

B.

Provides a unified picture of what data was accessed and when it was accessed

C.

Protects sensitive data from unauthorized access while allowing authorized users to access it at query runtime

D.

Identifies columns with personal information and tags them so masking policies can be applied to protect sensitive data

E.

Determines whether a given row in a table can be accessed by the user by filtering the data based on a given policy

Full Access
Question # 33

Which statement describes Snowflake tables?

A.

Snowflake tables arc logical representation of underlying physical data.

B.

Snowflake tables are the physical instantiation of data loaded into Snowflake.

C.

Snowflake tables require that clustering keys be defined lo perform optimally.

D.

Snowflake tables are owned by a use.

Full Access
Question # 34

If a virtual warehouse is suspended, what happens to the warehouse cache?

A.

The cache is dropped when the warehouse is suspended and is no longer available upon restart.

B.

The warehouse cache persists for as long the warehouse exists, regardless of its suspension status.

C.

The cache is maintained for up to two hours and can be restored If the warehouse Is restarted within this limit.

D.

The cache is maintained for the auto suspend duration and can be restored it the warehouse 15 restarted within this limit.

Full Access
Question # 35

How does the search optimization service help Snowflake users improve query performance?

A.

It scans the micro-partitions based on the joins used in the queries and scans only join columns.

B.

II maintains a persistent data structure that keeps track of the values of the table's columns m each of its micro-partitions.

C.

It scans the local disk cache to avoid scans on the tables used in the Query.

D.

It keeps track of running queries and their results and saves those extra scans on the table.

Full Access
Question # 36

Which statements reflect valid commands when using secondary roles? (Select TWO).

A.

Use SECONDARY ROLES RESUME

B.

USE SECONDARY ROLES SUSPEND

C.

USE SECONDARY RLES ALL

D.

USE SECONDARY ROLES ADD

E.

Use SECONDARY ROLES NONE

Full Access
Question # 37

What type of account can be used to share data with a consumer who does have a Snowflake account?

A.

Data provider

B.

Data consumer

C.

Reader

D.

Organization

Full Access
Question # 38

A user needs to MINIMIZE the cost of large tables that are used to store transitory data. The data does not need to be protected against failures, because the data can be reconstructed outside of Snowflake.

What table type should be used?

A.

Permanent

B.

Transient

C.

Temporary

D.

Externa

Full Access
Question # 39

Which views are included in the data_sharing_usage schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 40

What does Snowflake recommend a user do if they need to connect to Snowflake with a tool or technology mat is not listed in Snowflake partner ecosystem?

A.

Use Snowflake's native API.

B.

Use a custom-built connector.

C.

Contact Snowflake Support for a new driver.

D.

Connect through Snowflake’s JDBC or ODBC drivers

Full Access
Question # 41

Which Snowflake table supports unstructured data?

A.

Directory

B.

Transient

C.

Temporary

D.

Permanent

Full Access
Question # 42

Which semi-structured file format is a compressed, efficient, columnar data representation?

A.

Avro

B.

JSON

C.

TSV

D.

Parquet

Full Access
Question # 43

Snowflake's access control framework combines which models for securing data? (Select TWO).

A.

Attribute-based Access Control (ABAC 1

B.

Discretionary Access Control (DAC)

C.

Access Control List (ACL)

D.

Role-based Access Control (RBAC)

E.

Rule-based Access Control (RuBAC)

Full Access
Question # 44

A user wants to access stored in a stage without authenticating into Snowflake.

Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

Full Access
Question # 45

What does Snowflake recommend for a user assigned the ACCOUNTADMIN role?

A.

The ACCCUKTMKIN role should be set as tie user's default role.

B.

The user should use federated authentication instead of a password

C.

The user should be required to use Multi-Factor Authentication (MFA).

D.

There should be just one user with the ACCOUNTADMIN role in each Snowflake account.

Full Access
Question # 46

Which privilege is required on a virtual warehouse to abort any existing executing queries?

A.

USAGE

B.

OPERATE

C.

MODIFY

D.

MONITOR

Full Access
Question # 47

Which function should be used to find the query ID of the second query executed in a current session?

A.

Select LAST_QUERY_ID(-2)

B.

Select LAST_QUERY_ID(2)

C.

Select LAST_QUERY_ID(1)

D.

Select LAST_QUERY_ID(2)

Full Access
Question # 48

In which hierarchy is tag inheritance possible?

A.

Organization » Account» Role

B.

Account » User » Schema

C.

Database » View » Column

D.

Schema » Table » Column

Full Access
Question # 49

Given the statement template below, which database objects can be added to a share?(Select TWO).

GRANT ON To SHARE ;

A.

Secure functions

B.

Stored procedures

C.

Streams

D.

Tables

E.

Tasks

Full Access
Question # 50

How does Snowflake handle the data retention period for a table if a stream has not been consumed?

A.

The data retention period is reduced to a minimum of 14 days.

B.

The data retention period is permanently extended for the table.

C.

The data retention period is temporarily extended to the stream's offset.

D.

The data retention period is not affected by the stream consumption.

Full Access
Question # 51

While running a query on a virtual warehouse in auto-scale mode, additional clusters are stated immediately if which setting is configured?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 52

Which Snowflake privilege is required on a pipe object to pause or resume pipes?

A.

OPERATE

B.

READ

C.

SELECT

D.

USAGE

Full Access
Question # 53

Which Snowflake table type persists until it is explicitly dropped. is available for all users with relevant privileges (across sessions). and has no Fail-safe period?

A.

External

B.

Permanent

C.

Temporary

D.

Transient

Full Access
Question # 54

What happens when a suspended virtual warehouse is resized in Snowflake?

A.

It will return an error.

B.

It will return a warning.

C.

The suspended warehouse is resumed and new compute resources are provisioned immediately.

D.

The additional compute resources are provisioned when the warehouse is resumed.

Full Access
Question # 55

A column named "Data" contains VARIANT data and stores values as follows:

How will Snowflake extract the employee's name from the column data?

A.

Data:employee.name

B.

DATA:employee.name

C.

data:Employee.name

D.

data:employee.name

Full Access
Question # 56

The property mins_to_bypass_network_policy is set at which level?

A.

User

B.

Role

C.

Account

D.

Organization

Full Access
Question # 57

What is a non-configurable feature that provides historical data that Snowflake may recover during a 7-day period?

A.

Fail-safe

B.

Time Travel

C.

Cloning

D.

Account replication

Full Access
Question # 58

Which Snowflake feature is used for both querying and restoring data?

A.

Cluster keys

B.

Time Travel

C.

Fail-safe

D.

Cloning

Full Access
Question # 59

What tasks can be completed using the copy command? (Select TWO)

A.

Columns can be aggregated

B.

Columns can be joined with an existing table

C.

Columns can be reordered

D.

Columns can be omitted

E.

Data can be loaded without the need to spin up a virtual warehouse

Full Access
Question # 60

What transformations are supported in a CREATE PIPE ... AS COPY ... FROM (....) statement? (Select TWO.)

A.

Data can be filtered by an optional where clause

B.

Incoming data can be joined with other tables

C.

Columns can be reordered

D.

Columns can be omitted

E.

Row level access can be defined

Full Access
Question # 61

Which command is used to unload data from a Snowflake table into a file in a stage?

A.

COPY INTO

B.

GET

C.

WRITE

D.

EXTRACT INTO

Full Access
Question # 62

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)

A.

Customer-managed encryption keys through Tri-Secret Secure

B.

Automatic encryption of all data

C.

Up to 90 days of data recovery through Time Travel

D.

Object-level access control

E.

Column-level security to apply data masking policies to tables and views

Full Access
Question # 63

Which of the following objects can be shared through secure data sharing?

A.

Masking policy

B.

Stored procedure

C.

Task

D.

External table

Full Access
Question # 64

What feature can be used to reorganize a very large table on one or more columns?

A.

Micro-partitions

B.

Clustering keys

C.

Key partitions

D.

Clustered partitions

Full Access
Question # 65

Which of the following is a valid source for an external stage when the Snowflake account is located on Microsoft Azure?

A.

An FTP server with TLS encryption

B.

An HTTPS server with WebDAV

C.

A Google Cloud storage bucket

D.

A Windows server file share on Azure

Full Access
Question # 66

Which of the following Snowflake features provide continuous data protection automatically? (Select TWO).

A.

Internal stages

B.

Incremental backups

C.

Time Travel

D.

Zero-copy clones

E.

Fail-safe

Full Access
Question # 67

True or False: Reader Accounts are able to extract data from shared data objects for use outside of Snowflake.

A.

True

B.

False

Full Access
Question # 68

True or False: A Virtual Warehouse can be resized while suspended.

A.

True

B.

False

Full Access
Question # 69

What are two ways to create and manage Data Shares in Snowflake? (Choose two.)

A.

Via the Snowflake Web Interface (Ul)

B.

Via the data_share=true parameter

C.

Via SQL commands

D.

Via Virtual Warehouses

Full Access
Question # 70

During periods of warehouse contention which parameter controls the maximum length of time a warehouse will hold a query for processing?

A.

STATEMENT_TIMEOUT__IN__SECONDS

B.

STATEMENT_QUEUED_TIMEOUT_IN_SECONDS

C.

MAX_CONCURRENCY__LEVEL

D.

QUERY_TIMEOUT_IN_SECONDS

Full Access
Question # 71

A user has an application that writes a new Tile to a cloud storage location every 5 minutes.

What would be the MOST efficient way to get the files into Snowflake?

A.

Create a task that runs a copy into operation from an external stage every 5 minutes

B.

Create a task that puts the files in an internal stage and automate the data loading wizard

C.

Create a task that runs a GET operation to intermittently check for new files

D.

Set up cloud provider notifications on the Tile location and use Snowpipe with auto-ingest

Full Access
Question # 72

What happens when a virtual warehouse is resized?

A.

When increasing the size of an active warehouse the compute resource for all running and queued queries on the warehouse are affected

B.

When reducing the size of a warehouse the compute resources are removed only when they are no longer being used to execute any current statements.

C.

The warehouse will be suspended while the new compute resource is provisioned and will resume automatically once provisioning is complete.

D.

Users who are trying to use the warehouse will receive an error message until the resizing is complete

Full Access
Question # 73

Which statement about billing applies to Snowflake credits?

A.

Credits are billed per-minute with a 60-minute minimum

B.

Credits are used to pay for cloud data storage usage

C.

Credits are consumed based on the number of credits billed for each hour that a warehouse runs

D.

Credits are consumed based on the warehouse size and the time the warehouse is running

Full Access
Question # 74

A company strongly encourages all Snowflake users to self-enroll in Snowflake's default Multi-Factor Authentication (MFA) service to provide increased login security for users connecting to Snowflake.

Which application will the Snowflake users need to install on their devices in order to connect with MFA?

A.

Okta Verify

B.

Duo Mobile

C.

Microsoft Authenticator

D.

Google Authenticator

Full Access
Question # 75

Which services does the Snowflake Cloud Services layer manage? (Select TWO).

A.

Compute resources

B.

Query execution

C.

Authentication

D.

Data storage

E.

Metadata

Full Access
Question # 76

Which data types does Snowflake support when querying semi-structured data? (Select TWO)

A.

VARIANT

B.

ARRAY

C.

VARCHAR

D.

XML

E.

BLOB

Full Access
Question # 77

Which of the following are benefits of micro-partitioning? (Select TWO)

A.

Micro-partitions cannot overlap in their range of values

B.

Micro-partitions are immutable objects that support the use of Time Travel.

C.

Micro-partitions can reduce the amount of I/O from object storage to virtual warehouses

D.

Rows are automatically stored in sorted order within micro-partitions

E.

Micro-partitions can be defined on a schema-by-schema basis

Full Access
Question # 78

A sales table FCT_SALES has 100 million records.

The following Query was executed

SELECT COUNT (1) FROM FCT__SALES;

How did Snowflake fulfill this query?

A.

Query against the result set cache

B.

Query against a virtual warehouse cache

C.

Query against the most-recently created micro-partition

D.

Query against the metadata excite

Full Access
Question # 79

Which semi-structured file formats are supported when unloading data from a table? (Select TWO).

A.

ORC

B.

XML

C.

Avro

D.

Parquet

E.

JSON

Full Access
Question # 80

Which of the following conditions must be met in order to return results from the results cache? (Select TWO).

A.

The user has the appropriate privileges on the objects associated with the query

B.

Micro-partitions have been reclustered since the query was last run

C.

The new query is run using the same virtual warehouse as the previous query

D.

The query includes a User Defined Function (UDF)

E.

The query has been run within 24 hours of the previously-run query

Full Access
Question # 81

Which command can be used to stage local files from which Snowflake interface?

A.

SnowSQL

B.

Snowflake classic web interface (Ul)

C.

Snowsight

D.

.NET driver

Full Access
Question # 82

The Information Schema and Account Usage Share provide storage information for which of the following objects? (Choose three.)

A.

Users

B.

Tables

C.

Databases

D.

Internal Stages

Full Access
Question # 83

When is the result set cache no longer available? (Select TWO)

A.

When another warehouse is used to execute the query

B.

When another user executes the query

C.

When the underlying data has changed

D.

When the warehouse used to execute the query is suspended

E.

When it has been 24 hours since the last query

Full Access
Question # 84

Which of the following describes how multiple Snowflake accounts in a single organization relate to various cloud providers?

A.

Each Snowflake account can be hosted in a different cloud vendor and region.

B.

Each Snowflake account must be hosted in a different cloud vendor and region

C.

All Snowflake accounts must be hosted in the same cloud vendor and region

D.

Each Snowflake account can be hosted in a different cloud vendor, but must be in the same region.

Full Access
Question # 85

Which of the following indicates that it may be appropriate to use a clustering key for a table? (Select TWO).

A.

The table contains a column that has very low cardinality

B.

DML statements that are being issued against the table are blocked

C.

The table has a small number of micro-partitions

D.

Queries on the table are running slower than expected

E.

The clustering depth for the table is large

Full Access
Question # 86

What are value types that a VARIANT column can store? (Select TWO)

A.

STRUCT

B.

OBJECT

C.

BINARY

D.

ARRAY

E.

CLOB

Full Access
Question # 87

Which of the following compute resources or features are managed by Snowflake? (Select TWO).

A.

Execute a COPY command

B.

Updating data

C.

Snowpipe

D.

AUTOMATIC__CLUSTERING

E.

Scaling up a warehouse

Full Access
Question # 88

Which TABLE function helps to convert semi-structured data to a relational representation?

A.

CHECK_JSON

B.

TO_JSON

C.

FLATTEN

D.

PARSE_JSON

Full Access
Question # 89

What is a key feature of Snowflake architecture?

A.

Zero-copy cloning creates a mirror copy of a database that updates with the original

B.

Software updates are automatically applied on a quarterly basis

C.

Snowflake eliminates resource contention with its virtual warehouse implementation

D.

Multi-cluster warehouses allow users to run a query that spans across multiple clusters

E.

Snowflake automatically sorts DATE columns during ingest for fast retrieval by date

Full Access
Question # 90

Which type of join will list a I rows in the specified table, even if those rows have no match in the other table?

A.

Cross join

B.

Inner join

C.

Natural join

D.

Outer join

Full Access
Question # 91

Which of the following describes the Snowflake Cloud Services layer?

A.

Coordinates activities in the Snowflake account

B.

Executes queries submitted by the Snowflake account users

C.

Manages quotas on the Snowflake account storage

D.

Manages the virtual warehouse cache to speed up queries

Full Access
Question # 92

Which task privilege does a Snowflake role need in order to suspend or resume a task?

A.

USAGE

B.

OPERATE

C.

MONITOR

D.

OWNERSHIP

Full Access
Question # 93

A materialized view should be created when which of the following occurs? (Choose two.)

A.

There is minimal cost associated with running the query.

B.

The query consumes many compute resources every time it runs.

C.

The base table gets updated frequently.

D.

The query is highly optimized and does not consume many compute resources.

E.

The results of the query do not change often and are used frequently.

Full Access
Question # 94

Which of the following are considerations when using a directory table when working with unstructured data? (Choose two.)

A.

A directory table is a separate database object.

B.

Directory tables store data file metadata.

C.

A directory table will be automatically added to a stage.

D.

Directory tables do not have their own grantable privileges.

E.

Directory table data can not be refreshed manually.

Full Access
Question # 95

Which data type can store more than one type of data structure?

A.

JSON

B.

BINARY

C.

VARCHAR

D.

VARIANT

Full Access
Question # 96

What column type does a Kafka connector store formatted information in a single column?

A.

ARRAY

B.

OBJECT

C.

VARCHAR

D.

VARIANT

Full Access
Question # 97

At what levels can a resource monitor be configured? (Select TWO).

A.

Account

B.

Database

C.

Organization

D.

Schema

E.

Virtual warehouse

Full Access
Question # 98

What is a responsibility of Snowflake’s virtual warehouses?

A.

Infrastructure management

B.

Metadata management

C.

Query execution

D.

Query parsing and optimization

E.

Permanent storage of micro-partitions

Full Access
Question # 99

Which command is used to unload files from an internal or external stage to a local file system?

A.

COPY INTO

B.

GET

C.

PUT

D.

TRANSFER

Full Access
Question # 100

Which commands should be used to grant the privilege allowing a role to select data from all current tables and any tables that will be created later in a schema? (Choose two.)

A.

grant USAGE on all tables in schema DB1.SCHEMA to role MYROLE;

B.

grant USAGE on future tables in schema DB1.SCHEMA to role MYROLE;

C.

grant SELECT on all tables in schema DB1.SCHEMA to role MYROLE;

D.

grant SELECT on future tables in schema DB1.SCHEMA to role MYROLE;

E.

grant SELECT on all tables in database DB1 to role MYROLE;

F.

grant SELECT on future tables in database DB1 to role MYROLE;

Full Access
Question # 101

Which of the following statements describes a schema in Snowflake?

A.

A logical grouping of objects that belongs to a single database

B.

A logical grouping of objects that belongs to multiple databases

C.

A named Snowflake object that includes all the information required to share a database

D.

A uniquely identified Snowflake account within a business entity

Full Access
Question # 102

What is the difference between a stored procedure and a User-Defined Function (UDF)?

A.

Stored procedures can execute database operations while UDFs cannot.

B.

Returning a value is required in a stored procedure while returning values in a UDF is optional.

C.

Values returned by a stored procedure can be used directly in a SQL statement while the values returned by a UDF cannot.

D.

Multiple stored procedures can be called as part of a single executable statement while a single SQL statement can only call one UDF at a time.

Full Access
Question # 103

What happens when a database is cloned?

A.

It does not retain any privileges granted on the source object.

B.

It replicates all granted privileges on the corresponding source objects.

C.

It replicates all granted privileges on the corresponding child objects.

D.

It replicates all granted privileges on the corresponding child schema objects.

Full Access
Question # 104

Which transformation is supported by a COPY INTO

command?

A.

Filter using a where clause

B.

Filter using a limit keyword

C.

Cast using a SELECT statement

D.

Order using an ORDER BY clause

Full Access
command in Snowflake supports transformations such as casting using a SELECT statement. This allows for the transformation of data types as the data is being loaded into the table, which can be particularly useful when the data types in the source files do not match the data types in the target table

Question # 105

Which file format will keep floating-point numbers from being truncated when data is unloaded?

A.

CSV

B.

JSON

C.

ORC

D.

Parquet

Full Access
Question # 106

Which database objects can be shared with the Snowflake secure data sharing feature? (Choose two.)

A.

Files

B.

External tables

C.

Secure User-Defined Functions (UDFs)

D.

Sequences

E.

Streams

Full Access
Question # 107

Which languages requite that User-Defined Function (UDF) handlers be written inline? (Select TWO).

A.

Java

B.

Javascript

C.

Scala

D.

Python

E.

SQL

Full Access
Question # 108

If a multi-cluster warehouse is using an economy scaling policy, how long will queries wait in the queue before another cluster is started?

A.

1 minute

B.

2 minutes

C.

6 minutes

D.

8 minutes

Full Access
Question # 109

Which of the following practices are recommended when creating a user in Snowflake? (Choose two.)

A.

Configure the user to be initially disabled.

B.

Force an immediate password change.

C.

Set a default role for the user.

D.

Set the number of minutes to unlock to 15 minutes.

E.

Set the user's access to expire within a specified timeframe.

Full Access
Question # 110

Credit charges for Snowflake virtual warehouses are calculated based on which of the following considerations? (Choose two.)

A.

The number of queries executed

B.

The number of active users assigned to the warehouse

C.

The size of the virtual warehouse

D.

The length of time the warehouse is running

E.

The duration of the queries that are executed

Full Access
Question # 111

How would a user run a multi-cluster warehouse in maximized mode?

A.

Configure the maximum clusters setting to "Maximum."

B.

Turn on the additional clusters manually after starting the warehouse.

C.

Set the minimum Clusters and maximum Clusters settings to the same value.

D.

Set the minimum clusters and maximum clusters settings to different values.

Full Access
Question # 112

What is the minimum Snowflake edition needed for database failover and fail-back between Snowflake accounts for business continuity and disaster recovery?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 113

Which Snowflake edition enables data sharing only through Snowflake Support?

A.

Virtual Private Snowflake

B.

Business Critical

C.

Enterprise

D.

Standard

Full Access
Question # 114

How can a user improve the performance of a single large complex query in Snowflake?

A.

Scale up the virtual warehouse.

B.

Scale out the virtual warehouse.

C.

Enable standard warehouse scaling.

D.

Enable economy warehouse scaling.

Full Access
Question # 115

How can a data provider ensure that a data consumer is going to have access to the required objects?

A.

Enable the data sharing feature in the account and validate the view.

B.

Use the CURRENT_ROLE and CURRENT_USER functions to validate secure views.

C.

Use the CURRENT_ function to authorize users from a specific account to access rows in a base table.

D.

Set the SIMULATED DATA SHARING CONSUMER session parameter to the name of the consumer account for which access is being simulated.

Full Access
Question # 116

How can a Snowflake user access a JSON object, given the following table? (Select TWO).

A.

src:salesperson.name

B.

src:sa1esPerson. name

C.

src:salesperson.Name

D.

SRC:salesperson.name

E.

SRC:salesperson.Name

Full Access
Question # 117

A view is defined on a permanent table. A temporary table with the same name is created in the same schema as the referenced table. What will the query from the view return?

A.

The data from the permanent table.

B.

The data from the temporary table.

C.

An error stating that the view could not be compiled.

D.

An error stating that the referenced object could not be uniquely identified.

Full Access
Question # 118

Assume there is a table consisting of five micro-partitions with values ranging from A to Z.

Which diagram indicates a well-clustered table?

A.

B.

C.

D.

Full Access
Question # 119

Which Snowflake layer is always leveraged when accessing a query from the result cache?

A.

Metadata

B.

Data Storage

C.

Compute

D.

Cloud Services

Full Access
Question # 120

Which of the following are characteristics of Snowflake virtual warehouses? (Choose two.)

A.

Auto-resume applies only to the last warehouse that was started in a multi-cluster warehouse.

B.

The ability to auto-suspend a warehouse is only available in the Enterprise edition or above.

C.

SnowSQL supports both a configuration file and a command line option for specifying a default warehouse.

D.

A user cannot specify a default warehouse when using the ODBC driver.

E.

The default virtual warehouse size can be changed at any time.

Full Access
Question # 121

What versions of Snowflake should be used to manage compliance with Personal Identifiable Information (PII) requirements? (Choose two.)

A.

Custom Edition

B.

Virtual Private Snowflake

C.

Business Critical Edition

D.

Standard Edition

E.

Enterprise Edition

Full Access
Question # 122

What are the responsibilities of Snowflake's Cloud Service layer? (Choose three.)

A.

Authentication

B.

Resource management

C.

Virtual warehouse caching

D.

Query parsing and optimization

E.

Query execution

F.

Physical storage of micro-partitions

Full Access
Question # 123

How does Snowflake Fail-safe protect data in a permanent table?

A.

Fail-safe makes data available up to 1 day, recoverable by user operations.

B.

Fail-safe makes data available for 7 days, recoverable by user operations.

C.

Fail-safe makes data available for 7 days, recoverable only by Snowflake Support.

D.

Fail-safe makes data available up to 1 day, recoverable only by Snowflake Support.

Full Access
Question # 124

Which of the following is an example of an operation that can be completed without requiring compute, assuming no queries have been executed previously?

A.

SELECT SUM (ORDER_AMT) FROM SALES;

B.

SELECT AVG(ORDER_QTY) FROM SALES;

C.

SELECT MIN(ORDER_AMT) FROM SALES;

D.

SELECT ORDER_AMT * ORDER_QTY FROM SALES;

Full Access
Question # 125

Which Snowflake architectural layer is responsible for a query execution plan?

A.

Compute

B.

Data storage

C.

Cloud services

D.

Cloud provider

Full Access
Question # 126

A company needs to allow some users to see Personally Identifiable Information (PII) while limiting other users from seeing the full value of the PII.

Which Snowflake feature will support this?

A.

Row access policies

B.

Data masking policies

C.

Data encryption

D.

Role based access control

Full Access
Question # 127

A Snowflake Administrator needs to ensure that sensitive corporate data in Snowflake tables is not visible to end users, but is partially visible to functional managers.

How can this requirement be met?

A.

Use data encryption.

B.

Use dynamic data masking.

C.

Use secure materialized views.

D.

Revoke all roles for functional managers and end users.

Full Access
Question # 128

True or False: Snowpipe via REST API can only reference External Stages as source.

A.

True

B.

False

Full Access
Question # 129

Which of the following objects can be directly restored using the UNDROP command? (Choose two.)

A.

Schema

B.

View

C.

Internal stage

D.

Table

E.

User

F.

Role

Full Access
Question # 130

Which command should be used to download files from a Snowflake stage to a local folder on a client's machine?

A.

PUT

B.

GET

C.

COPY

D.

SELECT

Full Access
Question # 131

What happens to the shared objects for users in a consumer account from a share, once a database has been created in that account?

A.

The shared objects are transferred.

B.

The shared objects are copied.

C.

The shared objects become accessible.

D.

The shared objects can be re-shared.

Full Access
Question # 132

The bulk data load history that is available upon completion of the COPY statement is stored where and for how long?

A.

In the metadata of the target table for 14 days

B.

In the metadata of the pipe for 14 days

C.

In the metadata of the target table for 64 days

D.

In the metadata of the pipe for 64 days

Full Access
Question # 133

Which SQL commands, when committed, will consume a stream and advance the stream offset? (Choose two.)

A.

UPDATE TABLE FROM STREAM

B.

SELECT FROM STREAM

C.

INSERT INTO TABLE SELECT FROM STREAM

D.

ALTER TABLE AS SELECT FROM STREAM

E.

BEGIN COMMIT

Full Access
Question # 134

What type of query benefits the MOST from search optimization?

A.

A query that uses only disjunction (i.e., OR) predicates

B.

A query that includes analytical expressions

C.

A query that uses equality predicates or predicates that use IN

D.

A query that filters on semi-structured data types

Full Access
Question # 135

The is the minimum Fail-safe retention time period for transient tables?

A.

1 day

B.

7 days

C.

12 hours

D.

0 days

Full Access
Question # 136

What is the following SQL command used for?

Select * from table(validate(t1, job_id => '_last'));

A.

To validate external table files in table t1 across all sessions

B.

To validate task SQL statements against table t1 in the last 14 days

C.

To validate a file for errors before it gets executed using a COPY command

D.

To return errors from the last executed COPY command into table t1 in the current session

Full Access
Question # 137

What is the maximum total Continuous Data Protection (CDP) charges incurred for a temporary table?

A.

30 days

B.

7 days

C.

48 hours

D.

24 hours

Full Access
Question # 138

What is the maximum Time Travel retention period for a temporary Snowflake table?

A.

90 days

B.

1 day

C.

7 days

D.

45 days

Full Access
Question # 139

What is the purpose of multi-cluster virtual warehouses?

A.

To create separate data warehouses to increase query optimization

B.

To allow users the ability to choose the type of compute nodes that make up a virtual warehouse cluster

C.

To eliminate or reduce Queuing of concurrent queries

D.

To allow the warehouse to resize automatically

Full Access
Question # 140

In a Snowflake role hierarchy, what is the top-level role?

A.

SYSADMIN

B.

ORGADMIN

C.

ACCOUNTADMIN

D.

SECURITYADMIN

Full Access
Question # 141

What types of data listings are available in the Snowflake Data Marketplace? (Choose two.)

A.

Reader

B.

Consumer

C.

Vendor

D.

Standard

E.

Personalized

Full Access
Question # 142

Which Snowflake feature allows a user to substitute a randomly generated identifier for sensitive data, in order to prevent unauthorized users access to the data, before loading it into Snowflake?

A.

External Tokenization

B.

External Tables

C.

Materialized Views

D.

User-Defined Table Functions (UDTF)

Full Access
Question # 143

Which of the following statements apply to Snowflake in terms of security? (Choose two.)

A.

Snowflake leverages a Role-Based Access Control (RBAC) model.

B.

Snowflake requires a user to configure an IAM user to connect to the database.

C.

All data in Snowflake is encrypted.

D.

Snowflake can run within a user's own Virtual Private Cloud (VPC).

E.

All data in Snowflake is compressed.

Full Access
Question # 144

What features that are part of the Continuous Data Protection (CDP) feature set in Snowflake do not require additional configuration? (Choose two.)

A.

Row level access policies

B.

Data masking policies

C.

Data encryption

D.

Time Travel

E.

External tokenization

Full Access
Question # 145

What happens to historical data when the retention period for an object ends?

A.

The data is cloned into a historical object.

B.

The data moves to Fail-safe

C.

Time Travel on the historical data is dropped.

D.

The object containing the historical data is dropped.

Full Access
Question # 146

Snowflake supports the use of external stages with which cloud platforms? (Choose three.)

A.

Amazon Web Services

B.

Docker

C.

IBM Cloud

D.

Microsoft Azure Cloud

E.

Google Cloud Platform

F.

Oracle Cloud

Full Access
Question # 147

What is the minimum Snowflake edition required to use Dynamic Data Masking?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPC)

Full Access
Question # 148

When publishing a Snowflake Data Marketplace listing into a remote region what should be taken into consideration? (Choose two.)

A.

There is no need to have a Snowflake account in the target region, a share will be created for each user.

B.

The listing is replicated into all selected regions automatically, the data is not.

C.

The user must have the ORGADMIN role available in at least one account to link accounts for replication.

D.

Shares attached to listings in remote regions can be viewed from any account in an organization.

E.

For a standard listing the user can wait until the first customer requests the data before replicating it to the target region.

Full Access
Question # 149

Which of the following objects are contained within a schema? (Choose two.)

A.

Role

B.

Stream

C.

Warehouse

D.

External table

E.

User

F.

Share

Full Access
Question # 150

What is the minimum Snowflake edition required for row level security?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 151

Which URL provides access to files in Snowflake without authorization?

A.

File URL

B.

Scoped URL

C.

Pre-signed URL

D.

Scoped file URL

Full Access
Question # 152

What is the Fail-safe retention period for transient and temporary tables?

A.

0 days

B.

1 day

C.

7 days

D.

90 days

Full Access
Question # 153

How does a Snowflake stored procedure compare to a User-Defined Function (UDF)?

A.

A single executable statement can call only two stored procedures. In contrast, a single SQL statement can call multiple UDFs.

B.

A single executable statement can call only one stored procedure. In contrast, a single SQL statement can call multiple UDFs.

C.

A single executable statement can call multiple stored procedures. In contrast, multiple SQL statements can call the same UDFs.

D.

Multiple executable statements can call more than one stored procedure. In contrast, a single SQL statement can call multiple UDFs.

Full Access
Question # 154

What SnowFlake database object is derived from a query specification, stored for later use, and can speed up expensive aggregation on large data sets?

A.

Temporary table

B.

External table

C.

Secure view

D.

Materialized view

Full Access
Question # 155

If a virtual warehouse runs for 61 seconds, shut down, and then restart and runs for 30 seconds, for how many seconds is it billed?

A.

60

B.

91

C.

120

D.

121

Full Access
Question # 156

What is the default value in the Snowflake Web Interface (Ul) for auto suspending a Virtual Warehouse?

A.

1 minutes

B.

5 minutes

C.

10 minutes

D.

15 minutes

Full Access
Question # 157

Why would a Snowflake user decide to use a materialized view instead of a regular view?

A.

The base tables do not change frequently.

B.

The results of the view change often.

C.

The query is not resource intensive.

D.

The query results are not used frequently.

Full Access
Question # 158

What are the benefits of the replication feature in Snowflake? (Select TWO).

A.

Disaster recovery

B.

Time Travel

C.

Fail-safe

D.

Database failover and fallback

E.

Data security

Full Access
Question # 159

What activities can a user with the ORGADMIN role perform? (Select TWO).

A.

Create an account for an organization.

B.

Edit the account data for an organization.

C.

Delete the account data for an organization.

D.

View usage information for all accounts in an organization.

E.

Select all the data in tables for all accounts in an organization.

Full Access
Question # 160

What criteria does Snowflake use to determine the current role when initiating a session? (Select TWO).

A.

If a role was specified as part of the connection and that role has been granted to the Snowflake user, the specified role becomes the current role.

B.

If no role was specified as part of the connection and a default role has been defined for the Snowflake user, that role becomes the current role.

C.

If no role was specified as part of the connection and a default role has not been set for the Snowflake user, the session will not be initiated and the log in will fail.

D.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, it will be ignored and the default role will become the current role.

E.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, the role is automatically granted and it becomes the current role.

Full Access
Question # 161

What happens when a network policy includes values that appear in both the allowed and blocked IP address list?

A.

Those IP addresses are allowed access to the Snowflake account as Snowflake applies the allowed IP address list first.

B.

Those IP addresses are denied access lei the Snowflake account as Snowflake applies the blocked IP address list first.

C.

Snowflake issues an alert message and adds the duplicate IP address values lo both 'he allowed and blocked IP address lists.

D.

Snowflake issues an error message and adds the duplicate IP address values to both the allowed and blocked IP address list

Full Access
Question # 162

Which Snowflake mechanism is used to limit the number of micro-partitions scanned by a query?

A.

Caching

B.

Cluster depth

C.

Query pruning

D.

Retrieval optimization

Full Access
Question # 163

Which statement accurately describes Snowflake's architecture?

A.

It uses a local data repository for all compute nodes in the platform.

B.

It is a blend of shared-disk and shared-everything database architectures.

C.

It is a hybrid of traditional shared-disk and shared-nothing database architectures.

D.

It reorganizes loaded data into internal optimized, compressed, and row-based format.

Full Access
Question # 164

A user has semi-structured data to load into Snowflake but is not sure what types of operations will need to be performed on the data. Based on this situation, what type of column does Snowflake recommend be used?

A.

ARRAY

B.

OBJECT

C.

TEXT

D.

VARIANT

Full Access
Question # 165

The effects of query pruning can be observed by evaluating which statistics? (Select TWO).

A.

Partitions scanned

B.

Partitions total

C.

Bytes scanned

D.

Bytes read from result

E.

Bytes written

Full Access
Question # 166

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

Full Access
Question # 167

A Snowflake user is writing a User-Defined Function (UDF) that includes some unqualified object names.

How will those object names be resolved during execution?

A.

Snowflake will resolve them according to the SEARCH_PATH parameter.

B.

Snowflake will only check the schema the UDF belongs to.

C.

Snowflake will first check the current schema, and then the schema the previous query used

D.

Snowflake will first check the current schema, and them the PUBLIC schema of the current database.

Full Access
Question # 168

Which Snowflake layer is associated with virtual warehouses?

A.

Cloud services

B.

Query processing

C.

Elastic memory

D.

Database storage

Full Access
Question # 169

How can a user get the MOST detailed information about individual table storage details in Snowflake?

A.

SHOW TABLES command

B.

SHOW EXTERNAL TABLES command

C.

TABLES view

D.

TABLE STORAGE METRICS view

Full Access
Question # 170

What is the MINIMUM permission needed to access a file URL from an external stage?

A.

MODIFY

B.

READ

C.

SELECT

D.

USAGE

Full Access
Question # 171

Which function will provide the proxy information needed to protect Snowsight?

A.

SYSTEMADMIN_TAG

B.

SYSTEM$GET_PRIVATELINK

C.

SYSTEMSALLONTLIST

D.

SYSTEMAUTHORIZE

Full Access
Question # 172

Which command should be used to unload all the rows from a table into one or more files in a named stage?

A.

COPY INTO

B.

GET

C.

INSERT INTO

D.

PUT

Full Access
Question # 173

Which command can be used to list all the file formats for which a user has access privileges?

A.

LIST

B.

ALTER FILE FORMAT

C.

DESCRIBE FILE FORMAT

D.

SHOW FILE FORMATS

Full Access
Question # 174

For Directory tables, what stage allows for automatic refreshing of metadata?

A.

User stage

B.

Table stage

C.

Named internal stage

D.

Named external stage

Full Access
Question # 175

Which command removes a role from another role or a user in Snowflak?

A.

ALTER ROLE

B.

REVOKE ROLE

C.

USE ROLE

D.

USE SECONDARY ROLES

Full Access
Question # 176

What are characteristic of Snowsight worksheet? (Select TWO.)

A.

Worksheets can be grouped under folder, and a folder of folders.

B.

Each worksheet is a unique Snowflake session.

C.

Users are limited to running only one on a worksheet.

D.

The Snowflake session ends when a user switches worksheets.

E.

Users can import worksheets and share them with other users.

Full Access
Question # 177

What is the Fail-safe period for a transient table in the Snowflake Enterprise edition and higher?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 178

What is the MAXIMUM number of clusters that can be provisioned with a multi-cluster virtual warehouse?

A.

1

B.

5

C.

10

D.

100

Full Access
Question # 179

When unloading data, which file format preserves the data values for floating-point number columns?

A.

Avro

B.

CSV

C.

JSON

D.

Parquet

Full Access
Question # 180

What is it called when a customer managed key is combined with a Snowflake managed key to create a composite key for encryption?

A.

Hierarchical key model

B.

Client-side encryption

C.

Tri-secret secure encryption

D.

Key pair authentication

Full Access
Question # 181

How are network policies defined in Snowflake?

A.

They are a set of rules that define the network routes within Snowflake.

B.

They are a set of rules that dictate how Snowflake accounts can be used between multiple users.

C.

They are a set of rules that define how data can be transferred between different Snowflake accounts within an organization.

D.

They are a set of rules that control access to Snowflake accounts by specifying the IP addresses or ranges of IP addresses that are allowed to connect

to Snowflake.

Full Access