Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

COF-C02 Questions and Answers

Question # 6

What are characteristic of Snowsight worksheet? (Select TWO.)

A.

Worksheets can be grouped under folder, and a folder of folders.

B.

Each worksheet is a unique Snowflake session.

C.

Users are limited to running only one on a worksheet.

D.

The Snowflake session ends when a user switches worksheets.

E.

Users can import worksheets and share them with other users.

Full Access
Question # 7

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

Full Access
Question # 8

Which Snowflake view is used to support compliance auditing?

A.

ACCESS_HISTORY

B.

COPY_HISTORY

C.

QUERY_HISTORY

D.

ROW ACCESS POLICIES

Full Access
Question # 9

While clustering a table, columns with which data types can be used as clustering keys? (Select TWO).

A.

BINARY

B.

GEOGRAPHY

C.

GEOMETRY

D.

OBJECT

E.

VARIANT

Full Access
Question # 10

What happens to the objects in a reader account when the DROP MANAGED ACCOUNT command is executed?

A.

The objects are dropped.

B.

The objects enter the Fail-safe period.

C.

The objects enter the Time Travel period.

D.

The objects are immediately moved to the provider account.

Full Access
Question # 11

What metadata does Snowflake store for rows in micro-partitions? (Select TWO).

A.

Range of values

B.

Distinct values

C.

Index values

D.

Sorted values

E.

Null values

Full Access
Question # 12

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.

Bytes scanned

B.

Bytes written to result

C.

Partitions scanned

D.

Partitions total

E.

Percentage scanned from cache

Full Access
Question # 13

Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?

A.

OAuth

B.

Network policies

C.

Single Sign-On (SSO)

D.

Multi-Factor Authentication (MFA)

Full Access
Question # 14

When using the ALLOW CLIENT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 15

What is the default value in the Snowflake Web Interface (Ul) for auto suspending a Virtual Warehouse?

A.

1 minutes

B.

5 minutes

C.

10 minutes

D.

15 minutes

Full Access
Question # 16

Which commands are restricted in owner's rights stored procedures? (Select TWO).

A.

SHOW

B.

MERGE

C.

INSERT

D.

DELETE

E.

DESCRIBE

Full Access
Question # 17

What is the relationship between a Query Profile and a virtual warehouse?

A.

A Query Profile can help users right-size virtual warehouses.

B.

A Query Profile defines the hardware specifications of the virtual warehouse.

C.

A Query Profile can help determine the number of virtual warehouses available.

D.

A Query Profile automatically scales the virtual warehouse based on the query complexity.

Full Access
Question # 18

Which of the following indicates that it may be appropriate to use a clustering key for a table? (Select TWO).

A.

The table contains a column that has very low cardinality

B.

DML statements that are being issued against the table are blocked

C.

The table has a small number of micro-partitions

D.

Queries on the table are running slower than expected

E.

The clustering depth for the table is large

Full Access
Question # 19

How can a Snowflake administrator determine which user has accessed a database object that contains sensitive information?

A.

Review the granted privileges to the database object.

B.

Review the row access policy for the database object.

C.

Query the ACCESS_HlSTORY view in the ACCOUNT_USAGE schema.

D.

Query the REPLICATION USAGE HISTORY view in the ORGANIZATION USAGE schema.

Full Access
Question # 20

Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)

A.

INTEGER

B.

OBJECT

C.

VARIANT

D.

VARCHAR

E.

LIST

Full Access
Question # 21

Which ACCOUNT_USAGE schema database role provides visibility into policy-related information?

A.

USAGE_VIEWER

B.

GOVERNANCE_VIEWER

C.

OBJECT_VIEWER

D.

SECURITY_VIEWER

Full Access
Question # 22

What is the minimum Snowflake Edition that supports secure storage of Protected Health Information (PHI) data?

A.

Standard Edition

B.

Enterprise Edition

C.

Business Critical Edition

D.

Virtual Private Snowflake Edition

Full Access
Question # 23

Which solution improves the performance of point lookup queries that return a small number of rows from large tables using highly selective filters?

A.

Automatic clustering

B.

Materialized views

C.

Query acceleration service

D.

Search optimization service

Full Access
Question # 24

While working with unstructured data, which file function generates a Snowflake-hosted file URL to a staged file using the stage name and relative file path as inputs?

A.

GET_PRESIGNED_URL

B.

GET_ABSOLUTE_PATH

C.

BUILD_STAGE_FILE_URL

D.

BUILD SCOPED FILE URL

Full Access
Question # 25

Which privilege must be granted by one role to another role, and cannot be revoked?

A.

MONITOR

B.

OPERATE

C.

OWNERSHIP

D.

ALL

Full Access
Question # 26

For which use cases is running a virtual warehouse required? (Select TWO).

A.

When creating a table

B.

When loading data into a table

C.

When unloading data from a table

D.

When executing a show command

E.

When executing a list command

Full Access
Question # 27

Which Snowflake table objects can be shared with other accounts? (Select TWO).

A.

Temporary tables

B.

Permanent tables

C.

Transient tables

D.

External tables

E.

User-Defined Table Functions (UDTFs)

Full Access
Question # 28

When working with a managed access schema, who has the OWNERSHIP privilege of any tables added to the schema?

A.

The database owner

B.

The object owner

C.

The schema owner

D.

The Snowflake user's role

Full Access
Question # 29

Which operation can be performed on Snowflake external tables?

A.

INSERT

B.

JOIN

C.

RENAME

D.

ALTER

Full Access
Question # 30

What does SnowCD help Snowflake users to do?

A.

Copy data into files.

B.

Manage different databases and schemas.

C.

Troubleshoot network connections to Snowflake.

D.

Write SELECT queries to retrieve data from external tables.

Full Access
Question # 31

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.

SELECT

B.

OWNERSHIP

C.

MONITOR

D.

MODIFY

E.

USAGE

Full Access
Question # 32

Which object can be used with Secure Data Sharing?

A.

View

B.

Materialized view

C.

External table

D.

User-Defined Function (UDF)

Full Access
Question # 33

Which Snowflake command can be used to unload the result of a query to a single file?

A.

Use COPY INTO followed by a GET command to download the file.

B.

Use COPY INTO followed by a put command to download the file.

C.

Use COPY INTO with SINGLE = TRUE followed by a GET command to download the file.

D.

Use COPY INTO with SINGLE = TRUE followed by a PUT command to download the file.

Full Access
Question # 34

What type of query will benefit from the query acceleration service?

A.

Queries without filters or aggregation

B.

Queries with large scans and selective filters

C.

Queries where the GROUP BY has high cardinality

D.

Queries of tables that have search optimization service enabled

Full Access
Question # 35

Which metadata table will store the storage utilization information even for dropped tables?

A.

DATABASE_STORAGE_USAGE_HISTORY

B.

TABLE_STORAGE_METRICS

C.

STORAGE_DAILY_HISTORY

D.

STAGE STORAGE USAGE HISTORY

Full Access
Question # 36

How can a Snowflake user validate data that is unloaded using the COPY INTO command?

A.

Load the data into a CSV file.

B.

Load the data into a relational table.

C.

Use the VALlDATlON_MODE - SQL statement.

D.

Use the validation mode = return rows statement.

Full Access
Question # 37

Which Snowflake feature allows a user to track sensitive data for compliance, discovery, protection, and resource usage?

A.

Tags

B.

Comments

C.

Internal tokenization

D.

Row access policies

Full Access
Question # 38

Which statements describe benefits of Snowflake's separation of compute and storage? (Select TWO).

A.

The separation allows independent scaling of computing resources.

B.

The separation ensures consistent data encryption across all virtual data warehouses.

C.

The separation supports automatic conversion of semi-structured data into structured data for advanced data analysis.

D.

Storage volume growth and compute usage growth can be tightly coupled.

E.

Compute can be scaled up or down without the requirement to add more storage.

Full Access
Question # 39

Which Snowflake mechanism is used to limit the number of micro-partitions scanned by a query?

A.

Caching

B.

Cluster depth

C.

Query pruning

D.

Retrieval optimization

Full Access
Question # 40

There are two Snowflake accounts in the same cloud provider region: one is production and the other is non-production. How can data be easily transferred from the production account to the non-production account?

A.

Clone the data from the production account to the non-production account.

B.

Create a data share from the production account to the non-production account.

C.

Create a subscription in the production account and have it publish to the non-production account.

D.

Create a reader account using the production account and link the reader account to the non-production account.

Full Access
Question # 41

What transformations are supported when loading data into a table using the COPY INTO

command? (Select TWO).

A.

Column reordering

B.

Column omission

C.

JOIN function

D.

FLATTEN function

E.

GROUP BY function

Full Access
Question # 42

What is the purpose of the Snowflake SPLIT TO_TABLE function?

A.

To count the number of characters in a string

B.

To split a string into an array of sub-strings

C.

To split a string and flatten the results into rows

D.

To split a string and flatten the results into columns

Full Access
Question # 43

A JSON file, that contains lots of dates and arrays, needs to be processed in Snowflake. The user wants to ensure optimal performance while querying the data.

How can this be achieved?

A.

Flatten the data and store it in structured data types in a flattened table. Query the table.

B.

Store the data in a table with a variant data type. Query the table.

C.

Store the data in a table with a vai : ant data type and include STRIP_NULL_VALUES while loading the table. Query the table.

D.

Store the data in an external stage and create views on top of it. Query the views.

Full Access
Question # 44

What is the primary purpose of a directory table in Snowflake?

A.

To store actual data from external stages

B.

To automatically expire file URLs for security

C.

To manage user privileges and access control

D.

To store file-level metadata about data files in a stage

Full Access
Question # 45

What does a masking policy consist of in Snowflake?

A.

A single data type, with one or more conditions, and one or more masking functions

B.

A single data type, with only one condition, and only one masking function

C.

Multiple data types, with only one condition, and one or more masking functions

D.

Multiple data types, with one or more conditions, and one or more masking functions

Full Access
Question # 46

How can a dropped internal stage be restored?

A.

Enable Time Travel.

B.

Clone the dropped stage.

C.

Execute the UNDROP command.

D.

Recreate the dropped stage.

Full Access
Question # 47

When enabling access to unstructured data, which URL permits temporary access to a staged file without the need to grant privileges to the stage or to issue access tokens?

A.

File URL

B.

Scoped URL

C.

Relative URL

D.

Pre-Signed URL

Full Access
Question # 48

Which common query problems are identified by the Query Profile? (Select TWO.)

A.

Syntax error

B.

Inefficient pruning

C.

Ambiguous column names

D.

Queries too large to fit in memory

E.

Object does not exist or not authorized

Full Access
Question # 49

If a virtual warehouse runs for 61 seconds, shut down, and then restart and runs for 30 seconds, for how many seconds is it billed?

A.

60

B.

91

C.

120

D.

121

Full Access
Question # 50

Why would a Snowflake user decide to use a materialized view instead of a regular view?

A.

The base tables do not change frequently.

B.

The results of the view change often.

C.

The query is not resource intensive.

D.

The query results are not used frequently.

Full Access
Question # 51

What are valid sub-clauses to the OVER clause for a window function? (Select TWO).

A.

GROUP BY

B.

LIMIT

C.

ORDER BY

D.

PARTITION BY

E.

UNION ALL

Full Access
Question # 52

What should be used when creating a CSV file format where the columns are wrapped by single quotes or double quotes?

A.

BINARY_FORMAT

B.

ESCAPE_UNENCLOSED_FIELD

C.

FIELD_OPTIONALLY_ENCLOSED_BY

D.

SKIP BYTE ORDER MARK

Full Access
Question # 53

What is the MINIMUM permission needed to access a file URL from an external stage?

A.

MODIFY

B.

READ

C.

SELECT

D.

USAGE

Full Access
Question # 54

What will happen if a Snowflake user increases the size of a suspended virtual warehouse?

A.

The provisioning of new compute resources for the warehouse will begin immediately.

B.

The warehouse will remain suspended but new resources will be added to the query acceleration service.

C.

The provisioning of additional compute resources will be in effect when the warehouse is next resumed.

D.

The warehouse will resume immediately and start to share the compute load with other running virtual warehouses.

Full Access
Question # 55

Which privilege is required to use the search optimization service in Snowflake?

A.

GRANT SEARCH OPTIMIZATION ON SCHEMA TO ROLE

B.

GRANT SEARCH OPTIMIZATION ON DATABASE TO ROLE

C.

GRANT ADD SEARCH OPTIMIZATION ON SCHEMA TO ROLE

D.

GRANT ADD SEARCH OPTIMIZATION ON DATABASE TO ROLE

Full Access
Question # 56

What are the benefits of using the Snowflake Access_History view? (Select TWO).

A.

identifies data that is not being used so that it can be archived or deleted.

B.

It allows the user to compare query performance data over time.

C.

It audits whether query policies are being enforced correctly.

D.

It tracks how sensitive data has been moved.

E.

It allows users to track the relationships among objects.

Full Access
Question # 57

Which function is used to convert rows in a relational table to a single VARIANT column?

A.

ARRAY_AGG

B.

OBJECT_AGG

C.

ARRAY_CONSTRUCT

D.

OBJECT_CONSTRUCT

Full Access
Question # 58

Which command is used to start configuring Snowflake for Single Sign-On (SSO)?

A.

CREATE SESSION POLICY

B.

CREATE NETWORK RULE

C.

CREATE SECURITY INTEGRATION

D.

CREATE PASSWORD POLICY

Full Access
Question # 59

Which Snowflake native tool can be used to diagnose and troubleshoot network connections?

A.

SnowSQL

B.

Snowflake Python connector

C.

Snowsight

D.

SnowCD

Full Access
Question # 60

Which system function can be used to manage access to the data in a share and display certain data only to paying customers?

A.

SYSTEMSALLOWLIST

B.

SYSTEM$ALLOWLIST_PRIVATELINK

C.

SYSTEM$AUTHORIZE_PRIVATELINK

D.

SYSTEM$IS LISTING PURCHASED

Full Access
Question # 61

What are the possible values within a METADATASACTION column in a Snowflake stream? (Select TWO).

A.

INSERT

B.

UPDATE

C.

DELETE

D.

TRUNCATE

E.

UPSERT

Full Access
Question # 62

Which URL identifies the database, schema, stage, and tile path to a set of files for accessing the unstructured data files in Snowflake?

A.

Scoped URL

B.

File URL

C.

Pre-signed URL

D.

HTTPS URL

Full Access
Question # 63

Which object type is granted permissions for reading a table?

A.

User

B.

Role

C.

Attribute

D.

Schema

Full Access
Question # 64

What is the MINIMUM Snowflake edition required to add masking policies to selectively mask plain-text data in a table or in view columns at query time?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 65

Which Snowflake feature or tool helps troubleshoot issues in SQL query expressions that commonly cause performance bottlenecks?

A.

Persisted query results

B.

QUERY_HISTORY View

C.

Query acceleration service

D.

Query Profile

Full Access
Question # 66

How does the search optimization service help Snowflake users improve query performance?

A.

It scans the micro-partitions based on the joins used in the queries and scans only join columns.

B.

II maintains a persistent data structure that keeps track of the values of the table's columns m each of its micro-partitions.

C.

It scans the local disk cache to avoid scans on the tables used in the Query.

D.

It keeps track of running queries and their results and saves those extra scans on the table.

Full Access
Question # 67

What is the MINIMUM Snowftake edition that supports database replication?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 68

A query containing a WHERE clause is running longer than expected. The Query Profile shows that all micro-partitions being scanned How should this query be optimized?

A.

Create a view on the table.

B.

Add a clustering key to the table

C.

Add a limit clause to the query.

D.

Add a Dynamic Data Masking policy to the table.

Full Access
Question # 69

Which type of loop requires a BREAK statement to stop executing?

A.

FOR

B.

LOOP

C.

REPEAT

D.

WHILE

Full Access
Question # 70

What does a Notify & Suspend action for a resource monitor do?

A.

Send an alert notification to all account users who have notifications enabled.

B.

Send an alert notification to all virtual warehouse users when thresholds over 100% have been met.

C.

Send a notification to all account administrators who have notifications enabled, and suspend all assigned warehouses after all statements being executed by the warehouses have completed.

D.

Send a notification to all account administrators who have notifications enabled, and suspend all assigned warehouses immediately, canceling any statements being executed by the warehouses.

Full Access
Question # 71

Which system_defined Snowflake role has permission to rename an account and specify whether the original URL can be used to access the renamed account?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 72

What does a Query Profile metric that shows excessive spillage indicate?

A.

Poor query optimization

B.

Expired temporary tables

C.

Improper virtual warehouse sizing

D.

Improper Common Table Expressions (CTEs)

Full Access
Question # 73

When creating a virtual warehouse, what setting should be used to avoid both over-provisioning resources and auto-scaling when there is increased concurrency?

A.

WAREH0USE_SIZE = LARGE

B.

WAREHOUSEJTYPE = SNOWPARK-OPTIMIZED

C.

MAX_CLUSTER_COUHT - 10

D.

ENABLE_QUERY _ACCELERATION = TRUE

Full Access
Question # 74

What are characteristics of Snowflake network policies? (Select TWO).

A.

They can be set for any Snowflake Edition.

B.

They can be applied to roles.

C.

They restrict or enable access to specific IP addresses.

D.

They are activated using ALTER DATABASE SQL commands.

E.

They can only be managed using the ORGADMIN role.

Full Access
Question # 75

What is the impact of selecting one Snowflake edition over another? (Select TWO).

A.

The edition will impact the unit costs for storage.

B.

The edition will impact which regions can be accessed by the accounts.

C.

The edition will determine the unit costs for the compute credits.

D.

The edition will impact the total allowed storage space

E.

The edition will set a limit on the number of compute credits that can be consumed.

Full Access
Question # 76

Which schema-level objects allow the user to periodically perform an action under specific conditions, based on data within Snowflake?

A.

Alerts

B.

External tables

C.

Secure views

D.

Materialized views

Full Access
Question # 77

Which Snowflake object contains all the information required to share a database?

A.

Private listing

B.

Secure view

C.

Sequence

D.

Share

Full Access
Question # 78

Which multi-cluster virtual warehouse setting will help process queued queries as quickly as possible?

A.

An economy scaling policy

B.

A standard scaling policy

C.

Maximized mode

D.

Auto-scale mode

Full Access
Question # 79

Which network policy has the HIGHEST precedence?

A.

Security Integration

B.

Account

C.

Database

D.

User

Full Access
Question # 80

A clustering key was defined on a table, but It is no longer needed. How can the key be removed?

A.

ALTER TABLE

PURGE CLUSTERING KEY

B.

ALTER TABLE

DELETE CLUSTERING KEY

C.

ALTER TABLE

DROP CLUSTERING KEY

D.

ALTER TABLE

REMOVE CLUSTERING KEY

Full Access
Question # 81

What virtual warehouse configuration should be used when processing a large number of complex queries?

A.

Use the auto-resume feature.

B.

Run the warehouse in auto-scale mode.

C.

Increase the size of the warehouse.

D.

Increase the number of warehouse clusters.

Full Access
Question # 82

What does Snowflake recommend for a user assigned the ACCOUNTADMIN role?

A.

The ACCCUKTMKIN role should be set as tie user's default role.

B.

The user should use federated authentication instead of a password

C.

The user should be required to use Multi-Factor Authentication (MFA).

D.

There should be just one user with the ACCOUNTADMIN role in each Snowflake account.

Full Access
Question # 83

Which governance feature is supported by all Snowflake editions?

A.

Object tags

B.

Masking policies

C.

Row access policies

D.

OBJECT_DEPENDENCIES View

Full Access
Question # 84

What statement describes Snowflake data architecture?

A.

NoSQL warehouse as a service

B.

Single-node, isolated data

C.

Multi-cluster, shared data

D.

Centralized data storage and processing

Full Access
Question # 85

What is an advantage of using database roles instead of granting privileges on objects directly to a share in Snowflake?

A.

Easier management of cross-region data sharing

B.

Greater flexibility in including objects from multiple databases

C.

More control over object-level access for different user groups

D.

Reduction in the number of shares required for different objects in the same database

Full Access
Question # 86

Which parameters can be used together to ensure that a virtual warehouse never has a backlog of queued SQL statements? (Select TWO).

A.

STATEMENT_QUEUED_TIME0UT_IN_SECONDS

B.

STATEMENT_TIMEOUT_IN_SECONDS

C.

DATA_RETENTION_TIME_IN_DAYS

D.

MAX_CONCURRENCY_LEVEL

E.

MAX DATA EXTENSION TIME IN DAYS

Full Access
Question # 87

Which Snowflake tool provides detailed execution statistics of a query with no cost to the user?

A.

Query Profile

B.

Query history

C.

Visualization chart

D.

Query acceleration service

Full Access
Question # 88

What step must be taken to ensure that a user can only access Snowsight from a specific location, or when working from home?

A.

Use a company Virtual Private Network (VPN) connection.

B.

Use Multi-Factor Authentication (MFA)

C.

Use Single Sign-On (SSO).

D.

Add the user's IP address to the network policy allowed list.

Full Access
Question # 89

Which categories are included in the execution time summary in a Query Profile? (Select TWO).

A.

Pruning

B.

Spilling

C.

Initialization

D.

Local Disk I/O

E.

Percentage of data read from cache

Full Access
Question # 90

Which types of subqueries does Snowflake support? (Select TWO).

A.

Uncorrelated scalar subqueries in WHERE clauses

B.

Uncorrelated scalar subqueries in any place that a value expression can be used

C.

EXISTS, ANY / ALL, and IN subqueries in WHERE clauses: these subqueries can be uncorrelated only

D.

EXISTS, ANY / ALL, and IN subqueries in where clauses: these subqueries can be correlated only

E.

EXISTS, ANY /ALL, and IN subqueries in WHERE clauses: these subqueries can be correlated or uncorrelated

Full Access
Question # 91

Which privilege grants the ability to set a column-level security masking policy on a table or view column?

A.

APPLY

B.

CREATE

C.

SET

D.

MODIFY

Full Access
Question # 92

What kind of authentication do Snowpipe REST endpoints use?

A.

OAuth

B.

Key-based

C.

Username and password

D.

Single Sign-On (SSO)

Full Access
Question # 93

How can the access_history view in the account_usage schema be used to review the data governance settings for an account? (Select TWO).

A.

Identify queries run by a particular user.

B.

Identify access to the roles given to a user.

C.

Identify SQL statements that failed to run.

D.

Identify objects that were modified by a query.

E.

Identify object dependencies.

Full Access
Question # 94

Which views are included in the data_sharing_usage schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 95

What is the MINIMUM Snowflake edition that must be used in order to see the ACCESS_HISTORY view?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 96

What would cause different results to be returned when running the same query twice?

A.

SAMPLE is used and the seed is set

B.

sample is used and the seed is not set.

C.

Fraction-based sampling is used.

D.

Fixed-size sampling Is used.

Full Access
Question # 97

When creating a virtual warehouse in Snowsight using a create warehouse statement, which properties are enabled by default? (Select TWO).

A.

ENABLE_QUERY_ACCELERATTON

B.

INITIALLY_SUSPENDED

C.

RES0URCE_M0NTTOR

D.

AUTO_RESUME

E.

AUTO_SUSPEND

Full Access
Question # 98

Which function returns an integer between 0 and 100 when used to calculate the similarity of two strings?

A.

APPROXIMATE_SIMILARITY

B.

JAROWINKLER_SIMILARITY

C.

APPROXIMATE_JACCARD_INDEX

D.

MINHASH COMBINE

Full Access
Question # 99

Which Snowflake architectural layer is responsible for a query execution plan?

A.

Compute

B.

Data storage

C.

Cloud services

D.

Cloud provider

Full Access
Question # 100

Which function will convert semi-structured data to a relational data representation'?

A.

PARSE_JSON

B.

FLATTEN

C.

OBJECT_CONSTRUCT

D.

OBJECT AGG

Full Access
Question # 101

Which statement will trigger a stream to advance its offset?

A.

DESCRIBE STREAM

B.

ALTER STREAM

C.

DROP STREAM

D.

CREATE OR REPLACE STREAM

Full Access
Question # 102

In an auto-scaling multi-cluster virtual warehouse with the setting SCALING_POLICY = ECONOMY enabled, when is another cluster started?

A.

When the system has enough load for 2 minutes

B.

When the system has enough load for 6 minutes

C.

When the system has enough load for 8 minutes

D.

When the system has enough load for 10 minutes

Full Access
Question # 103

What actions will prevent leveraging of the ResultSet cache? (Choose two.)

A.

Removing a column from the query SELECT list

B.

Stopping the virtual warehouse that the query is running against

C.

Clustering of the data used by the query

D.

Executing the RESULTS_SCAN() table function

E.

Changing a column that is not in the cached query

Full Access
Question # 104

The Snowflake Cloud Data Platform is described as having which of the following architectures?

A.

Shared-disk

B.

Shared-nothing

C.

Multi-cluster shared data

D.

Serverless query engine

Full Access
Question # 105

True or False: Snowpipe via REST API can only reference External Stages as source.

A.

True

B.

False

Full Access
Question # 106

A company needs to allow some users to see Personally Identifiable Information (PII) while limiting other users from seeing the full value of the PII.

Which Snowflake feature will support this?

A.

Row access policies

B.

Data masking policies

C.

Data encryption

D.

Role based access control

Full Access
Question # 107

In a Snowflake role hierarchy, what is the top-level role?

A.

SYSADMIN

B.

ORGADMIN

C.

ACCOUNTADMIN

D.

SECURITYADMIN

Full Access
Question # 108

If 3 size Small virtual warehouse is made up of two servers, how many servers make up a Large warehouse?

A.

4

B.

8

C.

16

D.

32

Full Access
Question # 109

When cloning a database, what is cloned with the database? (Choose two.)

A.

Privileges on the database

B.

Existing child objects within the database

C.

Future child objects within the database

D.

Privileges on the schemas within the database

E.

Only schemas and tables within the database

Full Access
Question # 110

Which command can be used to load data files into a Snowflake stage?

A.

JOIN

B.

COPY INTO

C.

PUT

D.

GET

Full Access
Question # 111

The Snowflake Search Optimization Services supports improved performance of which kind of query?

A.

Queries against large tables where frequent DML occurs

B.

Queries against tables larger than 1 TB

C.

Selective point lookup queries

D.

Queries against a subset of columns in a table

Full Access
Question # 112

What is the minimum Snowflake edition required for row level security?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 113

Snowflake supports the use of external stages with which cloud platforms? (Choose three.)

A.

Amazon Web Services

B.

Docker

C.

IBM Cloud

D.

Microsoft Azure Cloud

E.

Google Cloud Platform

F.

Oracle Cloud

Full Access
Question # 114

Which of the following describes a Snowflake stored procedure?

A.

They can be created as secure and hide the underlying metadata from the user.

B.

They can only access tables from a single database.

C.

They can contain only a single SQL statement.

D.

They can be created to run with a caller's rights or an owner's rights.

Full Access
Question # 115

What affects whether the query results cache can be used?

A.

If the query contains a deterministic function

B.

If the virtual warehouse has been suspended

C.

If the referenced data in the table has changed

D.

If multiple users are using the same virtual warehouse

Full Access
Question # 116

Which SQL commands, when committed, will consume a stream and advance the stream offset? (Choose two.)

A.

UPDATE TABLE FROM STREAM

B.

SELECT FROM STREAM

C.

INSERT INTO TABLE SELECT FROM STREAM

D.

ALTER TABLE AS SELECT FROM STREAM

E.

BEGIN COMMIT

Full Access
Question # 117

Which of the following are characteristics of Snowflake virtual warehouses? (Choose two.)

A.

Auto-resume applies only to the last warehouse that was started in a multi-cluster warehouse.

B.

The ability to auto-suspend a warehouse is only available in the Enterprise edition or above.

C.

SnowSQL supports both a configuration file and a command line option for specifying a default warehouse.

D.

A user cannot specify a default warehouse when using the ODBC driver.

E.

The default virtual warehouse size can be changed at any time.

Full Access
Question # 118

Which minimum Snowflake edition allows for a dedicated metadata store?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 119

By default, which Snowflake role is required to create a share?

A.

ORGADMIN

B.

SECURITYADMIN

C.

SHAREADMIN

D.

ACCOUNTADMIN

Full Access
Question # 120

When loading data into Snowflake via Snowpipe what is the compressed file size recommendation?

A.

10-50 MB

B.

100-250 MB

C.

300-500 MB

D.

1000-1500 MB

Full Access
Question # 121

Which statements are true concerning Snowflake's underlying cloud infrastructure? (Select THREE),

A.

Snowflake data and services are deployed in a single availability zone within a cloud provider's region.

B.

Snowflake data and services are available in a single cloud provider and a single region, the use of multiple cloud providers is not supported.

C.

Snowflake can be deployed in a customer's private cloud using the customer's own compute and storage resources for Snowflake compute and storage

D.

Snowflake uses the core compute and storage services of each cloud provider for its own compute and storage

E.

All three layers of Snowflake's architecture (storage, compute, and cloud services) are deployed and managed entirely on a selected cloud platform

F.

Snowflake data and services are deployed in at least three availability zones within a cloud provider's region

Full Access
Question # 122

What are common issues found by using the Query Profile? (Choose two.)

A.

Identifying queries that will likely run very slowly before executing them

B.

Locating queries that consume a high amount of credits

C.

Identifying logical issues with the queries

D.

Identifying inefficient micro-partition pruning

E.

Data spilling to a local or remote disk

Full Access
Question # 123

Which of the following is an example of an operation that can be completed without requiring compute, assuming no queries have been executed previously?

A.

SELECT SUM (ORDER_AMT) FROM SALES;

B.

SELECT AVG(ORDER_QTY) FROM SALES;

C.

SELECT MIN(ORDER_AMT) FROM SALES;

D.

SELECT ORDER_AMT * ORDER_QTY FROM SALES;

Full Access
Question # 124

Which of the following is a data tokenization integration partner?

A.

Protegrity

B.

Tableau

C.

DBeaver

D.

SAP

Full Access
Question # 125

What is the minimum Snowflake edition that has column-level security enabled?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 126

What is the minimum Snowflake edition required to use Dynamic Data Masking?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPC)

Full Access
Question # 127

A user is preparing to load data from an external stage

Which practice will provide the MOST efficient loading performance?

A.

Organize files into logical paths

B.

Store the files on the external stage to ensure caching is maintained

C.

Use pattern matching for regular expression execution

D.

Load the data in one large file

Full Access
Question # 128

How does Snowflake Fail-safe protect data in a permanent table?

A.

Fail-safe makes data available up to 1 day, recoverable by user operations.

B.

Fail-safe makes data available for 7 days, recoverable by user operations.

C.

Fail-safe makes data available for 7 days, recoverable only by Snowflake Support.

D.

Fail-safe makes data available up to 1 day, recoverable only by Snowflake Support.

Full Access
Question # 129

A user created a new worksheet within the Snowsight Ul and wants to share this with teammates

How can this worksheet be shared?

A.

Create a zero-copy clone of the worksheet and grant permissions to teammates

B.

Create a private Data Exchange so that any teammate can use the worksheet

C.

Share the worksheet with teammates within Snowsight

D.

Create a database and grant all permissions to teammates

Full Access
Question # 130

Which of the following features, associated with Continuous Data Protection (CDP), require additional Snowflake-provided data storage? (Choose two.)

A.

Tri-Secret Secure

B.

Time Travel

C.

Fail-safe

D.

Data encryption

E.

External stages

Full Access
Question # 131

Which of the following statements apply to Snowflake in terms of security? (Choose two.)

A.

Snowflake leverages a Role-Based Access Control (RBAC) model.

B.

Snowflake requires a user to configure an IAM user to connect to the database.

C.

All data in Snowflake is encrypted.

D.

Snowflake can run within a user's own Virtual Private Cloud (VPC).

E.

All data in Snowflake is compressed.

Full Access
Question # 132

What versions of Snowflake should be used to manage compliance with Personal Identifiable Information (PII) requirements? (Choose two.)

A.

Custom Edition

B.

Virtual Private Snowflake

C.

Business Critical Edition

D.

Standard Edition

E.

Enterprise Edition

Full Access
Question # 133

When cloning a database containing stored procedures and regular views, that have fully qualified table references, which of the following will occur?

A.

The cloned views and the stored procedures will reference the cloned tables in the cloned database.

B.

An error will occur, as views with qualified references cannot be cloned.

C.

An error will occur, as stored objects cannot be cloned.

D.

The stored procedures and views will refer to tables in the source database.

Full Access
Question # 134

Which file formats are supported for unloading data from Snowflake? (Choose two.)

A.

Avro

B.

JSON

C.

ORC

D.

XML

E.

Delimited (CSV, TSV, etc.)

Full Access
Question # 135

What are best practice recommendations for using the ACCOUNTADMIN system-defined role in Snowflake? (Choose two.)

A.

Ensure all ACCOUNTADMIN roles use Multi-factor Authentication (MFA).

B.

All users granted ACCOUNTADMIN role must be owned by the ACCOUNTADMIN role.

C.

The ACCOUNTADMIN role must be granted to only one user.

D.

Assign the ACCOUNTADMIN role to at least two users, but as few as possible.

E.

All users granted ACCOUNTADMIN role must also be granted SECURITYADMIN role.

Full Access
Question # 136

What are supported file formats for unloading data from Snowflake? (Choose three.)

A.

XML

B.

JSON

C.

Parquet

D.

ORC

E.

AVRO

F.

CSV

Full Access
Question # 137

Which methods can be used to delete staged files from a Snowflake stage? (Choose two.)

A.

Use the DROP command after the load completes.

B.

Specify the TEMPORARY option when creating the file format.

C.

Specify the PURGE copy option in the COPY INTO

command.

D.

Use the REMOVE command after the load completes.

E.

Use the DELETE LOAD HISTORY command after the load completes.

Full Access
 command, which will automatically delete the files after they have been successfully loaded. Additionally, you can use the REMOVE command after the load completes to manually delete the files from the stage12.

References = DROP STAGE, REMOVE

Question # 138

What impacts the credit consumption of maintaining a materialized view? (Choose two.)

A.

Whether or not it is also a secure view

B.

How often the underlying base table is queried

C.

How often the base table changes

D.

Whether the materialized view has a cluster key defined

E.

How often the materialized view is queried

Full Access
Question # 139

Which of the following are best practices for loading data into Snowflake? (Choose three.)

A.

Aim to produce data files that are between 100 MB and 250 MB in size, compressed.

B.

Load data from files in a cloud storage service in a different region or cloud platform from the service or region containing the Snowflake account, to save on cost.

C.

Enclose fields that contain delimiter characters in single or double quotes.

D.

Split large files into a greater number of smaller files to distribute the load among the compute resources in an active warehouse.

E.

When planning which warehouse(s) to use for data loading, start with the largest warehouse possible.

F.

Partition the staged data into large folders with random paths, allowing Snowflake to determine the best way to load each file.

Full Access
Question # 140

Where can a user find and review the failed logins of a specific user for the past 30 days?

A.

The USERS view in ACCOUNT_USAGE

B.

The LOGIN_HISTORY view in ACCOUNT_USAGE

C.

The ACCESS_HISTORY view in ACCOUNT_USAGE

D.

The SESSIONS view in ACCOUNT_USAGE

Full Access
Question # 141

What is the MAXIMUM size limit for a record of a VARIANT data type?

A.

8MB

B.

16MB

C.

32MB

D.

128MB

Full Access
Question # 142

Which objects together comprise a namespace in Snowflake? (Select TWO).

A.

Account

B.

Database

C.

Schema

D.

Table

E.

Virtual warehouse

Full Access
Question # 143

Which data types are supported by Snowflake when using semi-structured data? (Choose two.)

A.

VARIANT

B.

VARRAY

C.

STRUCT

D.

ARRAY

E.

QUEUE

Full Access
Question # 144

Which pages are included in the Activity area of Snowsight? (Select TWO).

A.

Contacts

B.

Sharing settings

C.

Copy History

D.

Query History

E.

Automatic Clustering History

Full Access
Question # 145

How does Snowflake handle the bulk unloading of data into single or multiple files?

A.

It assigns each unloaded data file a unique name.

B.

It uses the put command to download the data by default.

C.

It uses COPY INTO for bulk unloading where the default option is SINGLE - TRUE.

D.

It uses COPY INTO to copy the data from a table into one or more files in an external stage only.

Full Access
Question # 146

In which Snowflake layer does Snowflake reorganize data into its internal optimized, compressed, columnar format?

A.

Cloud Services

B.

Database Storage

C.

Query Processing

D.

Metadata Management

Full Access
Question # 147

If a virtual warehouse runs for 61 seconds, shuts down, and then restarts and runs for 30 seconds, for how many seconds is it billed?

A.

60

B.

91

C.

120

D.

121

Full Access
Question # 148

Which of the following are considerations when using a directory table when working with unstructured data? (Choose two.)

A.

A directory table is a separate database object.

B.

Directory tables store data file metadata.

C.

A directory table will be automatically added to a stage.

D.

Directory tables do not have their own grantable privileges.

E.

Directory table data can not be refreshed manually.

Full Access
Question # 149

Which data type can store more than one type of data structure?

A.

JSON

B.

BINARY

C.

VARCHAR

D.

VARIANT

Full Access
Question # 150

Which semi-structured data function interprets an input string as a JSON document that produces a VARIANT value?

A.

PARSE_JSON

B.

CHECK_JSON

C.

JSON_EXTRACT_PATH_TEXT

D.

PARSE_XML

Full Access
Question # 151

What are benefits of using Snowpark with Snowflake? (Select TWO).

A.

Snowpark uses a Spark engine to generate optimized SQL query plans.

B.

Snowpark automatically sets up Spark within Snowflake virtual warehouses.

C.

Snowpark does not require that a separate cluster be running outside of Snowflake.

D.

Snowpark allows users to run existing Spark code on virtual warehouses without the need to reconfigure the code.

E.

Snowpark executes as much work as possible in the source databases for all operations including User-Defined Functions (UDFs).

Full Access
Question # 152

How can a Snowflake user optimize query performance in Snowflake? (Select TWO).

A.

Create a view.

B.

Cluster a table.

C.

Enable the search optimization service.

D.

Enable Time Travel.

E.

Index a table.

Full Access
Question # 153

What statistical information in a Query Profile indicates that the query is too large to fit in memory? (Select TWO).

A.

Bytes spilled to local cache.

B.

Bytes spilled to local storage.

C.

Bytes spilled to remote cache.

D.

Bytes spilled to remote storage.

E.

Bytes spilled to remote metastore.

Full Access
Question # 154

Which Snowflake URL type is used by directory tables?

A.

File

B.

Pre-signed

C.

Scoped

D.

Virtual-hosted style

Full Access
Question # 155

What type of columns does Snowflake recommend to be used as clustering keys? (Select TWO).

A.

A VARIANT column

B.

A column with very low cardinality

C.

A column with very high cardinality

D.

A column that is most actively used in selective filters

E.

A column that is most actively used in join predicates

Full Access
Question # 156

How does Snowflake allow a data provider with an Azure account in central Canada to share data with a data consumer on AWS in Australia?

A.

The data provider in Azure Central Canada can create a direct share to AWS Asia Pacific, if they are both in the same organization.

B.

The data consumer and data provider can form a Data Exchange within the same organization to create a share from Azure Central Canada to AWS Asia Pacific.

C.

The data provider uses the GET DATA workflow in the Snowflake Data Marketplace to create a share between Azure Central Canada and AWS Asia Pacific.

D.

The data provider must replicate the database to a secondary account in AWS Asia Pacific within the same organization then create a share to the data consumer's account.

Full Access
Question # 157

What happens when a database is cloned?

A.

It does not retain any privileges granted on the source object.

B.

It replicates all granted privileges on the corresponding source objects.

C.

It replicates all granted privileges on the corresponding child objects.

D.

It replicates all granted privileges on the corresponding child schema objects.

Full Access
Question # 158

Which query profile statistics help determine if efficient pruning is occurring? (Choose two.)

A.

Bytes sent over network

B.

Percentage scanned from cache

C.

Partitions total

D.

Bytes spilled to local storage

E.

Partitions scanned

Full Access
Question # 159

Which TABLE function helps to convert semi-structured data to a relational representation?

A.

CHECK_JSON

B.

TO_JSON

C.

FLATTEN

D.

PARSE_JSON

Full Access
Question # 160

A company needs to read multiple terabytes of data for an initial load as part of a Snowflake migration. The company can control the number and size of CSV extract files.

How does Snowflake recommend maximizing the load performance?

A.

Use auto-ingest Snowpipes to load large files in a serverless model.

B.

Produce the largest files possible, reducing the overall number of files to process.

C.

Produce a larger number of smaller files and process the ingestion with size Small virtual warehouses.

D.

Use an external tool to issue batched row-by-row inserts within BEGIN TRANSACTION and COMMIT commands.

Full Access
Question # 161

How would a user execute a series of SQL statements using a task?

A.

Include the SQL statements in the body of the task CREATE TASK mytask .. AS INSERT INTO target1 SELECT .. FROM stream_s1 WHERE .. INSERT INTO target2 SELECT .. FROM stream_s1

WHERE ..

B.

A stored procedure can have only one DML statement per stored procedure invocation and therefore the user should sequence stored procedure calls in the task definition CREATE TASK mytask .... AS

call stored_proc1(); call stored_proc2();

C.

Use a stored procedure executing multiple SQL statements and invoke the stored procedure from the task. CREATE TASK mytask .... AS call stored_proc_multiple_statements_inside();

D.

Create a task for each SQL statement (e.g. resulting in task1, task2, etc.) and string the series of SQL statements by having a control task calling task1, task2, etc. sequentially.

Full Access
Question # 162

What can a Snowflake user do with the information included in the details section of a Query Profile?

A.

Determine the total duration of the query.

B.

Determine the role of the user who ran the query.

C.

Determine the source system that the queried table is from.

D.

Determine if the query was on structured or semi-structured data.

Full Access
Question # 163

A Snowflake user executed a query and received the results. Another user executed the same query 4 hours later. The data had not changed.

What will occur?

A.

No virtual warehouse will be used, data will be read from the result cache.

B.

No virtual warehouse will be used, data will be read from the local disk cache.

C.

The default virtual warehouse will be used to read all data.

D.

The virtual warehouse that is defined at the session level will be used to read all data.

Full Access
Question # 164

How does Snowflake recommend handling the bulk loading of data batches from files already available in cloud storage?

A.

Use Snowpipe.

B.

Use the INSERT command.

C.

Use an external table.

D.

Use the COPY command.

Full Access
Question # 165

How many resource monitors can be assigned at the account level?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 166

Credit charges for Snowflake virtual warehouses are calculated based on which of the following considerations? (Choose two.)

A.

The number of queries executed

B.

The number of active users assigned to the warehouse

C.

The size of the virtual warehouse

D.

The length of time the warehouse is running

E.

The duration of the queries that are executed

Full Access
Question # 167

Which Snowflake objects can be shared with other Snowflake accounts? (Choose three.)

A.

Schemas

B.

Roles

C.

Secure Views

D.

Stored Procedures

E.

Tables

F.

Secure User-Defined Functions (UDFs)

Full Access
Question # 168

Where is Snowflake metadata stored?

A.

Within the data files

B.

In the virtual warehouse layer

C.

In the cloud services layer

D.

In the remote storage layer

Full Access
Question # 169

What is a responsibility of Snowflake’s virtual warehouses?

A.

Infrastructure management

B.

Metadata management

C.

Query execution

D.

Query parsing and optimization

E.

Permanent storage of micro-partitions

Full Access
Question # 170

A Snowflake user has been granted the create data EXCHANGE listing privilege with their role.

Which tasks can this user now perform on the Data Exchange? (Select TWO).

A.

Rename listings.

B.

Delete provider profiles.

C.

Modify listings properties.

D.

Modify incoming listing access requests.

E.

Submit listings for approval/publishing.

Full Access
Question # 171

By definition, a secure view is exposed only to users with what privilege?

A.

IMPORT SHARE

B.

OWNERSHIP

C.

REFERENCES

D.

USAGE

Full Access
Question # 172

How would a user run a multi-cluster warehouse in maximized mode?

A.

Configure the maximum clusters setting to "Maximum."

B.

Turn on the additional clusters manually after starting the warehouse.

C.

Set the minimum Clusters and maximum Clusters settings to the same value.

D.

Set the minimum clusters and maximum clusters settings to different values.

Full Access
Question # 173

What is the MINIMUM Snowflake edition required to use the periodic rekeying of micro-partitions?

A.

Enterprise

B.

Business Critical

C.

Standard

D.

Virtual Private Snowflake

Full Access
Question # 174

Data storage for individual tables can be monitored using which commands and/or objects? (Choose two.)

A.

SHOW STORAGE BY TABLE;

B.

SHOW TABLES;

C.

Information Schema -> TABLE_HISTORY

D.

Information Schema -> TABLE_FUNCTION

E.

Information Schema -> TABLE_STORAGE_METRICS

Full Access
Question # 175

Which role has the ability to create and manage users and roles?

A.

ORGADMIN

B.

USERADMIN

C.

SYSADMIN

D.

SECURITYADMIN

Full Access
Question # 176

A view is defined on a permanent table. A temporary table with the same name is created in the same schema as the referenced table. What will the query from the view return?

A.

The data from the permanent table.

B.

The data from the temporary table.

C.

An error stating that the view could not be compiled.

D.

An error stating that the referenced object could not be uniquely identified.

Full Access
Question # 177

How do Snowflake data providers share data that resides in different databases?

A.

External tables

B.

Secure views

C.

Materialized views

D.

User-Defined Functions (UDFs)

Full Access
Question # 178

Which user object property requires contacting Snowflake Support in order to set a value for it?

A.

DISABLED

B.

MINS TO BYPASS MFA

C.

MINS TO BYPASS NETWORK POLICY

D.

MINS TO UNLOCK

Full Access
Question # 179

For the ALLOWED VALUES tag property, what is the MAXIMUM number of possible string values for a single tag?

A.

10

B.

50

C.

64

D.

256

Full Access
Question # 180

What does Snowflake's search optimization service support?

A.

External tables

B.

Materialized views

C.

Tables and views that are not protected by row access policies

D.

Casts on table columns (except for fixed-point numbers cast to strings)

Full Access
Question # 181

Which statement accurately describes a characteristic of a materialized view?

A.

A materialized view can query only a single table.

B.

Data accessed through materialized views can be stale.

C.

Materialized view refreshes need to be maintained by the user.

D.

Querying a materialized view is slower than executing a query against the base table of the view.

Full Access
Question # 182

Which statement MOST accurately describes clustering in Snowflake?

A.

The database ACCOUNTADMIN must define the clustering methodology for each Snowflake table.

B.

Clustering is the way data is grouped together and stored within Snowflake micro-partitions.

C.

The clustering key must be included in the COPY command when loading data into Snowflake.

D.

Clustering can be disabled within a Snowflake account.

Full Access
Question # 183

A user needs to create a materialized view in the schema MYDB.MYSCHEMA.

Which statements will provide this access?

A.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO ROLE MYROLE;

B.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER USER1;

C.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER1;

D.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO MYROLE;

Full Access
Question # 184

Which of the following Snowflake objects can be shared using a secure share? (Select TWO).

A.

Materialized views

B.

Sequences

C.

Procedures

D.

Tables

E.

Secure User Defined Functions (UDFs)

Full Access
Question # 185

Which command can be used to load data into an internal stage?

A.

LOAD

B.

copy

C.

GET

D.

PUT

Full Access
Question # 186

In which use cases does Snowflake apply egress charges?

A.

Data sharing within a specific region

B.

Query result retrieval

C.

Database replication

D.

Loading data into Snowflake

Full Access
Question # 187

Which data type can be used to store geospatial data in Snowflake?

A.

Variant

B.

Object

C.

Geometry

D.

Geography

Full Access
Question # 188

Which copy INTO command outputs the data into one file?

A.

SINGLE=TRUE

B.

MAX_FILE_NUMBER=1

C.

FILE_NUMBER=1

D.

MULTIPLE=FAISE

Full Access
Question # 189

What can be used to view warehouse usage over time? (Select Two).

A.

The load HISTORY view

B.

The Query history view

C.

The show warehouses command

D.

The WAREHOUSE_METERING__HISTORY View

E.

The billing and usage tab in the Snowflake web Ul

Full Access
Question # 190

Query compilation occurs in which architecture layer of the Snowflake Cloud Data Platform?

A.

Compute layer

B.

Storage layer

C.

Cloud infrastructure layer

D.

Cloud services layer

Full Access
Question # 191

Which of the following objects can be shared through secure data sharing?

A.

Masking policy

B.

Stored procedure

C.

Task

D.

External table

Full Access
Question # 192

When reviewing the load for a warehouse using the load monitoring chart, the chart indicates that a high volume of Queries are always queuing in the warehouse

According to recommended best practice, what should be done to reduce the Queue volume? (Select TWO).

A.

Use multi-clustered warehousing to scale out warehouse capacity.

B.

Scale up the warehouse size to allow Queries to execute faster.

C.

Stop and start the warehouse to clear the queued queries

D.

Migrate some queries to a new warehouse to reduce load

E.

Limit user access to the warehouse so fewer queries are run against it.

Full Access
Question # 193

True or False: A Virtual Warehouse can be resized while suspended.

A.

True

B.

False

Full Access
Question # 194

What are two ways to create and manage Data Shares in Snowflake? (Choose two.)

A.

Via the Snowflake Web Interface (Ul)

B.

Via the data_share=true parameter

C.

Via SQL commands

D.

Via Virtual Warehouses

Full Access
Question # 195

What transformations are supported in a CREATE PIPE ... AS COPY ... FROM (....) statement? (Select TWO.)

A.

Data can be filtered by an optional where clause

B.

Incoming data can be joined with other tables

C.

Columns can be reordered

D.

Columns can be omitted

E.

Row level access can be defined

Full Access
Question # 196

What is the recommended file sizing for data loading using Snowpipe?

A.

A compressed file size greater than 100 MB, and up to 250 MB

B.

A compressed file size greater than 100 GB, and up to 250 GB

C.

A compressed file size greater than 10 MB, and up to 100 MB

D.

A compressed file size greater than 1 GB, and up to 2 GB

Full Access
Question # 197

What is the minimum Snowflake edition required to create a materialized view?

A.

Standard Edition

B.

Enterprise Edition

C.

Business Critical Edition

D.

Virtual Private Snowflake Edition

Full Access
Question # 198

In which scenarios would a user have to pay Cloud Services costs? (Select TWO).

A.

Compute Credits = 50 Credits Cloud Services = 10

B.

Compute Credits = 80 Credits Cloud Services = 5

C.

Compute Credits = 10 Credits Cloud Services = 9

D.

Compute Credits = 120 Credits Cloud Services = 10

E.

Compute Credits = 200 Credits Cloud Services = 26

Full Access
Question # 199

The Information Schema and Account Usage Share provide storage information for which of the following objects? (Choose three.)

A.

Users

B.

Tables

C.

Databases

D.

Internal Stages

Full Access
Question # 200

A user is loading JSON documents composed of a huge array containing multiple records into Snowflake. The user enables the strip__outer_array file format option

What does the STRIP_OUTER_ARRAY file format do?

A.

It removes the last element of the outer array.

B.

It removes the outer array structure and loads the records into separate table rows,

C.

It removes the trailing spaces in the last element of the outer array and loads the records into separate table columns

D.

It removes the NULL elements from the JSON object eliminating invalid data and enables the ability to load the records

Full Access
Question # 201

Which statement about billing applies to Snowflake credits?

A.

Credits are billed per-minute with a 60-minute minimum

B.

Credits are used to pay for cloud data storage usage

C.

Credits are consumed based on the number of credits billed for each hour that a warehouse runs

D.

Credits are consumed based on the warehouse size and the time the warehouse is running

Full Access
Question # 202

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?

A.

The primary cluster in the virtual warehouse

B.

The entire virtual warehouse

C.

The database in which the virtual warehouse resides

D.

The Queries currently being run on the virtual warehouse

Full Access
Question # 203

What SQL command would be used to view all roles that were granted to user.1?

A.

show grants to user USER1;

B.

show grants of user USER1;

C.

describe user USER1;

D.

show grants on user USER1;

Full Access
Question # 204

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)

A.

Customer-managed encryption keys through Tri-Secret Secure

B.

Automatic encryption of all data

C.

Up to 90 days of data recovery through Time Travel

D.

Object-level access control

E.

Column-level security to apply data masking policies to tables and views

Full Access
Question # 205

During periods of warehouse contention which parameter controls the maximum length of time a warehouse will hold a query for processing?

A.

STATEMENT_TIMEOUT__IN__SECONDS

B.

STATEMENT_QUEUED_TIMEOUT_IN_SECONDS

C.

MAX_CONCURRENCY__LEVEL

D.

QUERY_TIMEOUT_IN_SECONDS

Full Access
Question # 206

Which Snowflake partner specializes in data catalog solutions?

A.

Alation

B.

DataRobot

C.

dbt

D.

Tableau

Full Access
Question # 207

What are ways to create and manage data shares in Snowflake? (Select TWO)

A.

Through the Snowflake web interface (Ul)

B.

Through the DATA_SHARE=TRUE parameter

C.

Through SQL commands

D.

Through the enable__share=true parameter

E.

Using the CREATE SHARE AS SELECT * TABLE command

Full Access
Question # 208

How long is Snowpipe data load history retained?

A.

As configured in the create pipe settings

B.

Until the pipe is dropped

C.

64 days

D.

14 days

Full Access
Question # 209

What is a responsibility of Snowflake's virtual warehouses?

A.

Infrastructure management

B.

Metadata management

C.

Query execution

D.

Query parsing and optimization

E.

Management of the storage layer

Full Access
Question # 210

What happens to the underlying table data when a CLUSTER BY clause is added to a Snowflake table?

A.

Data is hashed by the cluster key to facilitate fast searches for common data values

B.

Larger micro-partitions are created for common data values to reduce the number of partitions that must be scanned

C.

Smaller micro-partitions are created for common data values to allow for more parallelism

D.

Data may be colocated by the cluster key within the micro-partitions to improve pruning performance

Full Access
Question # 211

Which stage type can be altered and dropped?

A.

Database stage

B.

External stage

C.

Table stage

D.

User stage

Full Access
Question # 212

User-level network policies can be created by which of the following roles? (Select TWO).

A.

ROLEADMIN

B.

ACCOUNTADMIN

C.

SYSADMIN

D.

SECURITYADMIN

E.

USERADMIN

Full Access
Question # 213

Which command is used to unload data from a Snowflake table into a file in a stage?

A.

COPY INTO

B.

GET

C.

WRITE

D.

EXTRACT INTO

Full Access
Question # 214

How would you determine the size of the virtual warehouse used for a task?

A.

Root task may be executed concurrently (i.e. multiple instances), it is recommended to leave some margins in the execution window to avoid missing instances of execution

B.

Querying (select) the size of the stream content would help determine the warehouse size. For example, if querying large stream content, use a larger warehouse size

C.

If using the stored procedure to execute multiple SQL statements, it's best to test run the stored procedure separately to size the compute resource first

D.

Since task infrastructure is based on running the task body on schedule, it's recommended to configure the virtual warehouse for automatic concurrency handling using Multi-cluster warehouse (MCW) to match the task schedule

Full Access
Question # 215

A company strongly encourages all Snowflake users to self-enroll in Snowflake's default Multi-Factor Authentication (MFA) service to provide increased login security for users connecting to Snowflake.

Which application will the Snowflake users need to install on their devices in order to connect with MFA?

A.

Okta Verify

B.

Duo Mobile

C.

Microsoft Authenticator

D.

Google Authenticator

Full Access
Question # 216

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

A.

SCIM

B.

Federated authentication

C.

TLS 1.2

D.

Key-pair authentication

E.

OAuth

F.

OCSP authentication

Full Access
Question # 217

What is the MOST performant file format for loading data in Snowflake?

A.

CSV (Unzipped)

B.

Parquet

C.

CSV (Gzipped)

D.

ORC

Full Access
Question # 218

What is a key feature of Snowflake architecture?

A.

Zero-copy cloning creates a mirror copy of a database that updates with the original

B.

Software updates are automatically applied on a quarterly basis

C.

Snowflake eliminates resource contention with its virtual warehouse implementation

D.

Multi-cluster warehouses allow users to run a query that spans across multiple clusters

E.

Snowflake automatically sorts DATE columns during ingest for fast retrieval by date

Full Access
Question # 219

Which of the following describes how clustering keys work in Snowflake?

A.

Clustering keys update the micro-partitions in place with a full sort, and impact the DML operations.

B.

Clustering keys sort the designated columns over time, without blocking DML operations

C.

Clustering keys create a distributed, parallel data structure of pointers to a table's rows and columns

D.

Clustering keys establish a hashed key on each node of a virtual warehouse to optimize joins at run-time

Full Access
Question # 220

What feature can be used to reorganize a very large table on one or more columns?

A.

Micro-partitions

B.

Clustering keys

C.

Key partitions

D.

Clustered partitions

Full Access
Question # 221

What features does Snowflake Time Travel enable?

A.

Querying data-related objects that were created within the past 365 days

B.

Restoring data-related objects that have been deleted within the past 90 days

C.

Conducting point-in-time analysis for Bl reporting

D.

Analyzing data usage/manipulation over all periods of time

Full Access
Question # 222

True or False: A 4X-Large Warehouse may, at times, take longer to provision than a X-Small Warehouse.

A.

True

B.

False

Full Access
Question # 223

A user has semi-structured data to load into Snowflake but is not sure what types of operations will need to be performed on the data. Based on this situation, what type of column does Snowflake recommend be used?

A.

ARRAY

B.

OBJECT

C.

TEXT

D.

VARIANT

Full Access
Question # 224

How are network policies defined in Snowflake?

A.

They are a set of rules that define the network routes within Snowflake.

B.

They are a set of rules that dictate how Snowflake accounts can be used between multiple users.

C.

They are a set of rules that define how data can be transferred between different Snowflake accounts within an organization.

D.

They are a set of rules that control access to Snowflake accounts by specifying the IP addresses or ranges of IP addresses that are allowed to connect

to Snowflake.

Full Access
Question # 225

What does the worksheet and database explorer feature in Snowsight allow users to do?

A.

Add or remove users from a worksheet.

B.

Move a worksheet to a folder or a dashboard.

C.

Combine multiple worksheets into a single worksheet.

D.

Tag frequently accessed worksheets for ease of access.

Full Access
Question # 226

Which Snowflake layer is associated with virtual warehouses?

A.

Cloud services

B.

Query processing

C.

Elastic memory

D.

Database storage

Full Access
Question # 227

Which statement accurately describes Snowflake's architecture?

A.

It uses a local data repository for all compute nodes in the platform.

B.

It is a blend of shared-disk and shared-everything database architectures.

C.

It is a hybrid of traditional shared-disk and shared-nothing database architectures.

D.

It reorganizes loaded data into internal optimized, compressed, and row-based format.

Full Access
Question # 228

Which role has the ability to create a share from a shared database by default?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 229

What information does the Query Profile provide?

A.

Graphical representation of the data model

B.

Statistics for each component of the processing plan

C.

Detailed Information about I he database schema

D.

Real-time monitoring of the database operations

Full Access
Question # 230

What are the benefits of the replication feature in Snowflake? (Select TWO).

A.

Disaster recovery

B.

Time Travel

C.

Fail-safe

D.

Database failover and fallback

E.

Data security

Full Access
Question # 231

Which data formats are supported by Snowflake when unloading semi-structured data? (Select TWO).

A.

Binary file in Avro

B.

Binary file in Parquet

C.

Comma-separated JSON

D.

Newline Delimited JSON

E.

Plain text file containing XML elements

Full Access
Question # 232

What is used to denote a pre-computed data set derived from a SELECT query specification and stored for later use?

A.

View

B.

Secure view

C.

Materialized view

D.

External table

Full Access
Question # 233

By default, how long is the standard retention period for Time Travel across all Snowflake accounts?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 234

Which activities are included in the Cloud Services layer? {Select TWO).

A.

Data storage

B.

Dynamic data masking

C.

Partition scanning

D.

User authentication

E.

Infrastructure management

Full Access
Question # 235

When using the ALLOW_CLI£NT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 236

Which URL provides access to files in Snowflake without authorization?

A.

File URL

B.

Scoped URL

C.

Pre-signed URL

D.

Scoped file URL

Full Access
Question # 237

How can a user get the MOST detailed information about individual table storage details in Snowflake?

A.

SHOW TABLES command

B.

SHOW EXTERNAL TABLES command

C.

TABLES view

D.

TABLE STORAGE METRICS view

Full Access
Question # 238

What is it called when a customer managed key is combined with a Snowflake managed key to create a composite key for encryption?

A.

Hierarchical key model

B.

Client-side encryption

C.

Tri-secret secure encryption

D.

Key pair authentication

Full Access
Question # 239

What are characteristics of transient tables in Snowflake? (Select TWO).

A.

Transient tables have a Fail-safe period of 7 days.

B.

Transient tables can be cloned to permanent tables.

C.

Transient tables persist until they are explicitly dropped.

D.

Transient tables can be altered to make them permanent tables.

E.

Transient tables have Time Travel retention periods of 0 or 1 day.

Full Access
Question # 240

Which function should be used to insert JSON format string data inot a VARIANT field?

A.

FLATTEN

B.

CHECK_JSON

C.

PARSE_JSON

D.

TO_VARIANT

Full Access
Question # 241

Which use case does the search optimization service support?

A.

Disjuncts (OR) in join predicates

B.

LIKE/ILIKE/RLIKE join predicates

C.

Join predicates on VARIANT columns

D.

Conjunctions (AND) of multiple equality predicates

Full Access
Question # 242

What criteria does Snowflake use to determine the current role when initiating a session? (Select TWO).

A.

If a role was specified as part of the connection and that role has been granted to the Snowflake user, the specified role becomes the current role.

B.

If no role was specified as part of the connection and a default role has been defined for the Snowflake user, that role becomes the current role.

C.

If no role was specified as part of the connection and a default role has not been set for the Snowflake user, the session will not be initiated and the log in will fail.

D.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, it will be ignored and the default role will become the current role.

E.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, the role is automatically granted and it becomes the current role.

Full Access
Question # 243

The VALIDATE table function has which parameter as an input argument for a Snowflake user?

A.

Last_QUERY_ID

B.

CURRENT_STATEMENT

C.

UUID_STRING

D.

JOB_ID

Full Access
Question # 244

What happens when a network policy includes values that appear in both the allowed and blocked IP address list?

A.

Those IP addresses are allowed access to the Snowflake account as Snowflake applies the allowed IP address list first.

B.

Those IP addresses are denied access lei the Snowflake account as Snowflake applies the blocked IP address list first.

C.

Snowflake issues an alert message and adds the duplicate IP address values lo both 'he allowed and blocked IP address lists.

D.

Snowflake issues an error message and adds the duplicate IP address values to both the allowed and blocked IP address list

Full Access
Question # 245

Which command can be used to list all the file formats for which a user has access privileges?

A.

LIST

B.

ALTER FILE FORMAT

C.

DESCRIBE FILE FORMAT

D.

SHOW FILE FORMATS

Full Access
Question # 246

What are characteristics of reader accounts in Snowflake? (Select TWO).

A.

Reader account users cannot add new data to the account.

B.

Reader account users can share data to other reader accounts.

C.

A single reader account can consume data from multiple provider accounts.

D.

Data consumers are responsible for reader account setup and data usage costs.

E.

Reader accounts enable data consumers to access and query data shared by the provider.

Full Access