New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

COF-C02 Questions and Answers

Question # 6

How long does Snowflake retain information in the ACCESS HISTORY view?

A.

7 days

B.

14 days

C.

28 days

D.

365 days

Full Access
Question # 7

What is the MINIMUM Snowflake edition required to use the periodic rekeying of micro-partitions?

A.

Enterprise

B.

Business Critical

C.

Standard

D.

Virtual Private Snowflake

Full Access
Question # 8

Which REST API can be used with unstructured data?

A.

inscrtFilcs

B.

insertReport

C.

GET /api/tiles/

D.

loadHistoryScan

Full Access
Question # 9

Which statement describes pruning?

A.

The filtering or disregarding of micro-partitions that are not needed to return a query.

B.

The return of micro-partitions values that overlap with each other to reduce a query's runtime.

C.

A service that is handled by the Snowflake Cloud Services layer to optimize caching.

D.

The ability to allow the result of a query to be accessed as if it were a table.

Full Access
Question # 10

What is the relationship between a Query Profile and a virtual warehouse?

A.

A Query Profile can help users right-size virtual warehouses.

B.

A Query Profile defines the hardware specifications of the virtual warehouse.

C.

A Query Profile can help determine the number of virtual warehouses available.

D.

A Query Profile automatically scales the virtual warehouse based on the query complexity.

Full Access
Question # 11

Using variables in Snowflake is denoted by using which SQL character?

A.

@

B.

&

C.

$

D.

#

Full Access
Question # 12

Query parsing and compilation occurs in which architecture layer of the Snowflake Cloud Data Platform?

A.

Cloud services layer

B.

Compute layer

C.

Storage layer

D.

Cloud agnostic layer

Full Access
Question # 13

Which transformation is supported by a COPY INTO

command?

A.

Filter using a where clause

B.

Filter using a limit keyword

C.

Cast using a SELECT statement

D.

Order using an ORDER BY clause

Full Access
command in Snowflake supports transformations such as casting using a SELECT statement. This allows for the transformation of data types as the data is being loaded into the table, which can be particularly useful when the data types in the source files do not match the data types in the target table

Question # 14

If a multi-cluster warehouse is using an economy scaling policy, how long will queries wait in the queue before another cluster is started?

A.

1 minute

B.

2 minutes

C.

6 minutes

D.

8 minutes

Full Access
Question # 15

Which Snowflake object can be accessed in he FROM clause of a query, returning a set of rows having one or more columns?

A.

A User-Defined Table Function (UDTF)

B.

A Scalar User Function (UDF)

C.

A stored procedure

D.

A task

Full Access
Question # 16

Which data types can be used in Snowflake to store semi-structured data? (Select TWO)

A.

ARRAY

B.

BLOB

C.

CLOB

D.

JSON

E.

VARIANT

Full Access
Question # 17

What metadata does Snowflake store for rows in micro-partitions? (Select TWO).

A.

Range of values

B.

Distinct values

C.

Index values

D.

Sorted values

E.

Null values

Full Access
Question # 18

By definition, a secure view is exposed only to users with what privilege?

A.

IMPORT SHARE

B.

OWNERSHIP

C.

REFERENCES

D.

USAGE

Full Access
Question # 19

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)

A.

Customer-managed encryption keys through Tri-Secret Secure

B.

Automatic encryption of all data

C.

Up to 90 days of data recovery through Time Travel

D.

Object-level access control

E.

Column-level security to apply data masking policies to tables and views

Full Access
Question # 20

How can a Snowflake administrator determine which user has accessed a database object that contains sensitive information?

A.

Review the granted privileges to the database object.

B.

Review the row access policy for the database object.

C.

Query the ACCESS_HlSTORY view in the ACCOUNT_USAGE schema.

D.

Query the REPLICATION USAGE HISTORY view in the ORGANIZATION USAGE schema.

Full Access
Question # 21

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.

Bytes scanned

B.

Bytes written to result

C.

Partitions scanned

D.

Partitions total

E.

Percentage scanned from cache

Full Access
Question # 22

A company needs to read multiple terabytes of data for an initial load as part of a Snowflake migration. The company can control the number and size of CSV extract files.

How does Snowflake recommend maximizing the load performance?

A.

Use auto-ingest Snowpipes to load large files in a serverless model.

B.

Produce the largest files possible, reducing the overall number of files to process.

C.

Produce a larger number of smaller files and process the ingestion with size Small virtual warehouses.

D.

Use an external tool to issue batched row-by-row inserts within BEGIN TRANSACTION and COMMIT commands.

Full Access
Question # 23

Which statements describe benefits of Snowflake's separation of compute and storage? (Select TWO).

A.

The separation allows independent scaling of computing resources.

B.

The separation ensures consistent data encryption across all virtual data warehouses.

C.

The separation supports automatic conversion of semi-structured data into structured data for advanced data analysis.

D.

Storage volume growth and compute usage growth can be tightly coupled.

E.

Compute can be scaled up or down without the requirement to add more storage.

Full Access
Question # 24

Which views are included in the DATA SHARING USAGE schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 25

How can a dropped internal stage be restored?

A.

Enable Time Travel.

B.

Clone the dropped stage.

C.

Execute the UNDROP command.

D.

Recreate the dropped stage.

Full Access
Question # 26

When using the ALLOW CLIENT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 27

Which Snowflake feature allows a user to track sensitive data for compliance, discovery, protection, and resource usage?

A.

Tags

B.

Comments

C.

Internal tokenization

D.

Row access policies

Full Access
Question # 28

Which statistics are displayed in a Query Profile that indicate that intermediate results do not fit in memory? (Select TWO).

A.

Bytes scanned

B.

Partitions scanned

C.

Bytes spilled to local storage

D.

Bytes spilled to remote storage

E.

Percentage scanned from cache

Full Access
Question # 29

Which commands are restricted in owner's rights stored procedures? (Select TWO).

A.

SHOW

B.

MERGE

C.

INSERT

D.

DELETE

E.

DESCRIBE

Full Access
Question # 30

Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?

A.

OAuth

B.

Network policies

C.

Single Sign-On (SSO)

D.

Multi-Factor Authentication (MFA)

Full Access
Question # 31

A permanent table and temporary table have the same name, TBL1, in a schema.

What will happen if a user executes select * from TBL1 ;?

A.

The temporary table will take precedence over the permanent table.

B.

The permanent table will take precedence over the temporary table.

C.

An error will say there cannot be two tables with the same name in a schema.

D.

The table that was created most recently will take precedence over the older table.

Full Access
Question # 32

When working with a managed access schema, who has the OWNERSHIP privilege of any tables added to the schema?

A.

The database owner

B.

The object owner

C.

The schema owner

D.

The Snowflake user's role

Full Access
Question # 33

Who can activate and enforce a network policy for all users in a Snowflake account? (Select TWO).

A.

A user with an USERADMIN or higher role

B.

A user with a SECURITYADMIN or higher role

C.

A role that has been granted the ATTACH POLICY privilege

D.

A role that has the NETWORK_POLlCY account parameter set

E.

A role that has the ownership of the network policy

Full Access
Question # 34

Which VALIDATION_MODE value will return the errors across the files specified in a COPY command, including files that were partially loaded during an earlier load?

A.

RETURN_-1_R0WS

B.

RETURN_n_ROWS

C.

RETURN_ERRORS

D.

RETURN ALL ERRORS

Full Access
Question # 35

Which object can be used with Secure Data Sharing?

A.

View

B.

Materialized view

C.

External table

D.

User-Defined Function (UDF)

Full Access
Question # 36

How can a Snowflake user validate data that is unloaded using the COPY INTO command?

A.

Load the data into a CSV file.

B.

Load the data into a relational table.

C.

Use the VALlDATlON_MODE - SQL statement.

D.

Use the validation mode = return rows statement.

Full Access
Question # 37

Which metadata table will store the storage utilization information even for dropped tables?

A.

DATABASE_STORAGE_USAGE_HISTORY

B.

TABLE_STORAGE_METRICS

C.

STORAGE_DAILY_HISTORY

D.

STAGE STORAGE USAGE HISTORY

Full Access
Question # 38

Which parameter can be set at the account level to set the minimum number of days for which Snowflake retains historical data in Time Travel?

A.

DATA_RETENTION_TIME_IN_DAYS

B.

MAX_DATA_EXTENSION_TIME_IN_DAYS

C.

MIN_DATA_RETENTION_TIME_IN_DAYS

D.

MAX CONCURRENCY LEVEL

Full Access
Question # 39

Which Snowflake role can manage any object grant globally, including modifying and revoking grants?

A.

USERADMIN

B.

ORGADMIN

C.

SYSADMIN

D.

SECURITYADMIN

Full Access
Question # 40

For which use cases is running a virtual warehouse required? (Select TWO).

A.

When creating a table

B.

When loading data into a table

C.

When unloading data from a table

D.

When executing a show command

E.

When executing a list command

Full Access
Question # 41

Which Snowflake command can be used to unload the result of a query to a single file?

A.

Use COPY INTO followed by a GET command to download the file.

B.

Use COPY INTO followed by a put command to download the file.

C.

Use COPY INTO with SINGLE = TRUE followed by a GET command to download the file.

D.

Use COPY INTO with SINGLE = TRUE followed by a PUT command to download the file.

Full Access
Question # 42

What does the LATERAL modifier for the FLATTEN function do?

A.

Casts the values of the flattened data

B.

Extracts the path of the flattened data

C.

Joins information outside the object with the flattened data

D.

Retrieves a single instance of a repeating element in the flattened data

Full Access
Question # 43

What objects in Snowflake are supported by Dynamic Data Masking? (Select TWO).'

A.

Views

B.

Materialized views

C.

Tables

D.

External tables

E.

Future grants

Full Access
Question # 44

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.

SELECT

B.

OWNERSHIP

C.

MONITOR

D.

MODIFY

E.

USAGE

Full Access
Question # 45

What tasks can an account administrator perform in the Data Exchange? (Select TWO).

A.

Add and remove members.

B.

Delete data categories.

C.

Approve and deny listing approval requests.

D.

Transfer listing ownership.

E.

Transfer ownership of a provider profile.

Full Access
Question # 46

Which Snowflake object does not consume any storage costs?

A.

Secure view

B.

Materialized view

C.

Temporary table

D.

Transient table

Full Access
Question # 47

Which Snowflake feature allows administrators to identify unused data that may be archived or deleted?

A.

Access history

B.

Data classification

C.

Dynamic Data Masking

D.

Object tagging

Full Access
Question # 48

Which of the following can be used when unloading data from Snowflake? (Choose two.)

A.

When unloading semi-structured data, it is recommended that the STRIP_OUTER_ARRAY option be used.

B.

Use the ENCODING file format option to change the encoding from the default UTF-8.

C.

The OBJECT_CONSTRUCT function can be used to convert relational data to semi-structured data.

D.

By using the SINGLE = TRUE parameter, a single file up to 5 GB in size can be exported to the storage layer.

E.

Use the PARSE_JSON function to ensure structured data will be unloaded into the VARIANT data type.

Full Access
Question # 49

The effects of query pruning can be observed by evaluating which statistics? (Select TWO).

A.

Partitions scanned

B.

Partitions total

C.

Bytes scanned

D.

Bytes read from result

E.

Bytes written

Full Access
Question # 50

Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)

A.

INTEGER

B.

OBJECT

C.

VARIANT

D.

VARCHAR

E.

LIST

Full Access
Question # 51

Which operation can be performed on Snowflake external tables?

A.

INSERT

B.

JOIN

C.

RENAME

D.

ALTER

Full Access
Question # 52

Which command is used to start configuring Snowflake for Single Sign-On (SSO)?

A.

CREATE SESSION POLICY

B.

CREATE NETWORK RULE

C.

CREATE SECURITY INTEGRATION

D.

CREATE PASSWORD POLICY

Full Access
Question # 53

Which view can be used to determine if a table has frequent row updates or deletes?

A.

TABLES

B.

TABLE_STORAGE_METRICS

C.

STORAGE_DAILY_HISTORY

D.

STORAGE USAGE

Full Access
Question # 54

What are valid sub-clauses to the OVER clause for a window function? (Select TWO).

A.

GROUP BY

B.

LIMIT

C.

ORDER BY

D.

PARTITION BY

E.

UNION ALL

Full Access
Question # 55

Which commands can only be executed using SnowSQL? (Select TWO).

A.

COPY INTO

B.

GET

C.

LIST

D.

PUT

E.

REMOVE

Full Access
Question # 56

When floating-point number columns are unloaded to CSV or JSON files, Snowflake truncates the values to approximately what?

A.

(12,2)

B.

(10,4)

C.

(14,8)

D.

(15,9)

Full Access
Question # 57

The VALIDATE table function has which parameter as an input argument for a Snowflake user?

A.

Last_QUERY_ID

B.

CURRENT_STATEMENT

C.

UUID_STRING

D.

JOB_ID

Full Access
Question # 58

A user has semi-structured data to load into Snowflake but is not sure what types of operations will need to be performed on the data. Based on this situation, what type of column does Snowflake recommend be used?

A.

ARRAY

B.

OBJECT

C.

TEXT

D.

VARIANT

Full Access
Question # 59

Which data types optimally store semi-structured data? (Select TWO).

A.

ARRAY

B.

CHARACTER

C.

STRING

D.

VARCHAR

E.

VARIANT

Full Access
Question # 60

What are characteristic of Snowsight worksheet? (Select TWO.)

A.

Worksheets can be grouped under folder, and a folder of folders.

B.

Each worksheet is a unique Snowflake session.

C.

Users are limited to running only one on a worksheet.

D.

The Snowflake session ends when a user switches worksheets.

E.

Users can import worksheets and share them with other users.

Full Access
Question # 61

Which function should be used to insert JSON format string data inot a VARIANT field?

A.

FLATTEN

B.

CHECK_JSON

C.

PARSE_JSON

D.

TO_VARIANT

Full Access
Question # 62

Which SQL command can be used to verify the privileges that are granted to a role?

A.

SHOW GRANTS ON ROLE

B.

SHOW ROLES

C.

SHOW GRANTS TO ROLE

D.

SHOW GRANTS FOR ROLE

Full Access
Question # 63

Which Snowflake mechanism is used to limit the number of micro-partitions scanned by a query?

A.

Caching

B.

Cluster depth

C.

Query pruning

D.

Retrieval optimization

Full Access
Question # 64

What will happen if a Snowflake user increases the size of a suspended virtual warehouse?

A.

The provisioning of new compute resources for the warehouse will begin immediately.

B.

The warehouse will remain suspended but new resources will be added to the query acceleration service.

C.

The provisioning of additional compute resources will be in effect when the warehouse is next resumed.

D.

The warehouse will resume immediately and start to share the compute load with other running virtual warehouses.

Full Access
Question # 65

What is the MINIMUM permission needed to access a file URL from an external stage?

A.

MODIFY

B.

READ

C.

SELECT

D.

USAGE

Full Access
Question # 66

Which command removes a role from another role or a user in Snowflak?

A.

ALTER ROLE

B.

REVOKE ROLE

C.

USE ROLE

D.

USE SECONDARY ROLES

Full Access
Question # 67

How does Snowflake describe its unique architecture?

A.

A single-cluster shared data architecture using a central data repository and massively parallel processing (MPP)

B.

A multi-duster shared nothing architecture using a soloed data repository and massively parallel processing (MPP)

C.

A single-cluster shared nothing architecture using a sliced data repository and symmetric multiprocessing (SMP)

D.

A multi-cluster shared nothing architecture using a siloed data repository and symmetric multiprocessing (SMP)

Full Access
Question # 68

How long is a query visible in the Query History page in the Snowflake Web Interface (Ul)?

A.

60 minutes

B.

24 hours

C.

14 days

D.

30 days

Full Access
Question # 69

What is the only supported character set for loading and unloading data from all supported file formats?

A.

UTF-8

B.

UTF-16

C.

ISO-8859-1

D.

WINDOWS-1253

Full Access
Question # 70

Which data formats are supported by Snowflake when unloading semi-structured data? (Select TWO).

A.

Binary file in Avro

B.

Binary file in Parquet

C.

Comma-separated JSON

D.

Newline Delimited JSON

E.

Plain text file containing XML elements

Full Access
Question # 71

Which Snowflow object does not consume and storage costs?

A.

Secure view

B.

Materialized view

C.

Temporary table

D.

Transient table

Full Access
Question # 72

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

Full Access
Question # 73

What does the worksheet and database explorer feature in Snowsight allow users to do?

A.

Add or remove users from a worksheet.

B.

Move a worksheet to a folder or a dashboard.

C.

Combine multiple worksheets into a single worksheet.

D.

Tag frequently accessed worksheets for ease of access.

Full Access
Question # 74

By default, which role has access to the SYSTEM$GLOBAL_ACCOUNT_SET_PARAMETER function?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 75

By default, how long is the standard retention period for Time Travel across all Snowflake accounts?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 76

For Directory tables, what stage allows for automatic refreshing of metadata?

A.

User stage

B.

Table stage

C.

Named internal stage

D.

Named external stage

Full Access
Question # 77

When referring to User-Defined Function (UDF) names in Snowflake, what does the term overloading mean?

A.

There are multiple SOL UDFs with the same names and the same number of arguments.

B.

There are multiple SQL UDFs with the same names and the same number of argument types.

C.

There are multiple SQL UDFs with the same names but with a different number of arguments or argument types.

D.

There are multiple SQL UDFs with different names but the same number of arguments or argument types.

Full Access
Question # 78

What should be used when creating a CSV file format where the columns are wrapped by single quotes or double quotes?

A.

BINARY_FORMAT

B.

ESCAPE_UNENCLOSED_FIELD

C.

FIELD_OPTIONALLY_ENCLOSED_BY

D.

SKIP BYTE ORDER MARK

Full Access
Question # 79

Which function will provide the proxy information needed to protect Snowsight?

A.

SYSTEMADMIN_TAG

B.

SYSTEM$GET_PRIVATELINK

C.

SYSTEMSALLONTLIST

D.

SYSTEMAUTHORIZE

Full Access
Question # 80

User1, who has the SYSADMIN role, executed a query on Snowsight. User2, who is in the same Snowflake account, wants to view the result set of the query executed by User1 using the Snowsight query history.

What will happen if User2 tries to access the query history?

A.

If User2 has the sysadmin role they will be able to see the results.

B.

If User2 has the securityadmin role they will be able to see the results.

C.

If User2 has the ACCOUNTADMIN role they will be able to see the results.

D.

User2 will be unable to view the result set of the query executed by User1.

Full Access
Question # 81

When using the ALLOW_CLI£NT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 82

Which privilege is required to use the search optimization service in Snowflake?

A.

GRANT SEARCH OPTIMIZATION ON SCHEMA TO ROLE

B.

GRANT SEARCH OPTIMIZATION ON DATABASE TO ROLE

C.

GRANT ADD SEARCH OPTIMIZATION ON SCHEMA TO ROLE

D.

GRANT ADD SEARCH OPTIMIZATION ON DATABASE TO ROLE

Full Access
Question # 83

When unloading data, which file format preserves the data values for floating-point number columns?

A.

Avro

B.

CSV

C.

JSON

D.

Parquet

Full Access
Question # 84

Which Snowflake layer is associated with virtual warehouses?

A.

Cloud services

B.

Query processing

C.

Elastic memory

D.

Database storage

Full Access
Question # 85

Which Snowflake table is an implicit object layered on a stage, where the stage can be either internal or external?

A.

Directory table

B.

Temporary table

C.

Transient table

D.

A table with a materialized view

Full Access
Question # 86

Which service or feature in Snowflake is used to improve the performance of certain types of lookup and analytical queries that use an extensive set of WHERE conditions?

A.

Data classification

B.

Query acceleration service

C.

Search optimization service

D.

Tagging

Full Access
Question # 87

While clustering a table, columns with which data types can be used as clustering keys? (Select TWO).

A.

BINARY

B.

GEOGRAPHY

C.

GEOMETRY

D.

OBJECT

E.

VARIANT

Full Access
Question # 88

What are characteristics of transient tables in Snowflake? (Select TWO).

A.

Transient tables have a Fail-safe period of 7 days.

B.

Transient tables can be cloned to permanent tables.

C.

Transient tables persist until they are explicitly dropped.

D.

Transient tables can be altered to make them permanent tables.

E.

Transient tables have Time Travel retention periods of 0 or 1 day.

Full Access
Question # 89

A Snowflake table that is loaded using a Kafka connector has a schema consisting of which two variant columns? (Select TWO).

A.

RECORD_TIMESTAMP

B.

RECORD_CONTENT

C.

RECORDKEY

D.

RECORD_SESSION

E.

RECORD_METADATA

Full Access
Question # 90

Snowflake users can create a resource monitor at which levels? (Select TWO).

A.

User level

B.

Pipe level

C.

Account level

D.

Cloud services level

E.

Virtual warehouse level

Full Access
Question # 91

How can the Query Profile be used to troubleshoot a problematic query?

A.

It will indicate if a virtual warehouse memory is too small to run the query

B.

It will indicate if a user lacks the privileges needed to run the query.

C.

It will indicate if a virtual warehouse is in auto-scale mode

D.

It will indicate if the user has enough Snowflake credits to run the query

Full Access
Question # 92

What causes objects in a data share to become unavailable to a consumer account?

A.

The DATA_RETENTI0N_TIME_IN_DAYS parameter in the consumer account is set to 0.

B.

The consumer account runs the GRANT IMPORTED PRIVILEGES command on the data share every 24 hours.

C.

The objects in the data share are being deleted and the grant pattern is not re-applied systematically.

D.

The consumer account acquires the data share through a private data exchange.

Full Access
Question # 93

How does the search optimization service help Snowflake users improve query performance?

A.

It scans the micro-partitions based on the joins used in the queries and scans only join columns.

B.

II maintains a persistent data structure that keeps track of the values of the table's columns m each of its micro-partitions.

C.

It scans the local disk cache to avoid scans on the tables used in the Query.

D.

It keeps track of running queries and their results and saves those extra scans on the table.

Full Access
Question # 94

Which of the following SQL statements will list the version of the drivers currently being used?

A.

Execute SELECT CURRENT_ODBC_CLlENT(); from the Web Ul

B.

Execute SELECT CURRENT_JDBC_VERSION() ; from SnowSQL

C.

Execute SELECT CURRENT_CLIENT(); from an application

D.

Execute SELECT CURRENT_VERSION (); from the Python Connector

Full Access
Question # 95

A JSON document is stored in the source_colum of type VARIANT. The document has an array called elements. The array contains the name key that has a string value How can a Snowflake user extract the name from the first element?

A.

Source_column.element[1]:name

B.

Source_column.element[0]:name

C.

Source_column.element[1].name

D.

Source_column.element[0]:name

Full Access
Question # 96

When snaring data in Snowflake. what privileges does a Provider need to grant along with a share? (Select TWO).

A.

USAGE on the specific tables in the database.

B.

USAGE on the specific tables in the database.

C.

MODIFY on 1Mb specific tables in the database.

D.

USAGE on the database and the schema containing the tables to share

E.

OPEBATE on the database and the schema containing the tables to share.

Full Access
Question # 97

Which function unloads data from a relational table to JSON?

A.

TRUNC

B.

TRUNC(ID_NUMBER, 5)

C.

ID_NUMBER*100

D.

TO_CHAR

Full Access
Question # 98

Which query types will have significant performance improvement when run using the search optimization service? (Select TWO)

A.

Range searches

B.

Equality searches

C.

Substring searches

D.

Queries with IN predicates

E.

Queries with aggregation

Full Access
Question # 99

When does a materialized view get suspended in Snowflake?

A.

When a column is added to the base table

B.

When a column is dropped from the base table

C.

When a DML operation is run on the base table

D.

When the base table is reclustered

Full Access
Question # 100

What does Snowflake recommend for a user assigned the ACCOUNTADMIN role?

A.

The ACCCUKTMKIN role should be set as tie user's default role.

B.

The user should use federated authentication instead of a password

C.

The user should be required to use Multi-Factor Authentication (MFA).

D.

There should be just one user with the ACCOUNTADMIN role in each Snowflake account.

Full Access
Question # 101

What does Snowflake recommend as a best practice for using secure views?

A.

Use sequence-gen era ted values

B.

Programmatically reveal the identifiers.

C.

Use secure views solely for query convenience.

D.

Do not expose the sequence-generated column(s)

Full Access
Question # 102

Which service or tool is a Command Line Interface (CLI) client used for connecting to Snowflake to execute SQL queries?

A.

Snowsight

B.

SnowCD

C.

Snowpark

D.

SnowSQL

Full Access
Question # 103

Which Snowsight feature can be used to perform data manipulations and transformations using a programming language?

A.

SnowSQL

B.

Dashboards

C.

Python worksheets

D.

Provider Studio

Full Access
Question # 104

Which function determines the kind of value stored in a VARIANT column?

A.

CHECK_JSON

B.

IS_ARRAY

C.

IS_JSON

D.

TYPEOF

Full Access
Question # 105

Which view in SNOWFLAKE.ACCOUNT_USAGE shows from which IP address a user connected to Snowflak?

A.

ACCESS_HOSTORY

B.

LOGIN_HISTORY

C.

SESSIONS

D.

QUERY HISTORY

Full Access
Question # 106

Which function can be used to convert semi-structured data into rows and columns?

A.

TABLE

B.

FLATTEN

C.

PARSE_JSON

D.

JSON EXTRACT PATH TEXT

Full Access
Question # 107

Which Snowflake table type persists until it is explicitly dropped. is available for all users with relevant privileges (across sessions). and has no Fail-safe period?

A.

External

B.

Permanent

C.

Temporary

D.

Transient

Full Access
Question # 108

Which function returns the URL of a stage using the stage name as the input?

A.

BUILD_STAGE_FILE_URL

B.

BUILD_SCOPED_FILE_URL

C.

GET_PRESIGNED_URL

D.

GET STAGE LOCATION

Full Access
Question # 109

Which Snowflake table type is only visible to the user who creates it, can have the same name as permanent tables in the same schema, and is dropped at the end of the session?

A.

Temporary

B.

Local

C.

User

D.

Transient

Full Access
Question # 110

Who can create network policies within Snowflake? (Select TWO).

A.

SYSADMIN only

B.

ORCADMIN only

C.

SECURITYADMIN or higher roles

D.

A role with the CREATE NETWORK POLICY privilege

E.

A role with the CREATE SECURITY INTEGRATION privilege

Full Access
Question # 111

What action should be taken if a Snowflake user wants to share a newly created object in a database with consumers?

A.

Use the automatic sharing feature for seamless access.

B.

Drop the object and then re-add it to the database to trigger sharing.

C.

Recreate the object with a different name in the database before sharing.

D.

Use the grant privilege ... TO share command to grant the necessary privileges.

Full Access
Question # 112

When a Snowflake user loads CSV data from a stage, which copy into

command guideline should they follow?

A.

The CSV field delimiter must be a comma character (*,"),

B.

The number of columns in each row should be consistent.

C.

The data file in the stage must be in a compressed format.

D.

The data file must have the same number of columns as the target table.

Full Access
Question # 113

What does the Activity area of Snowsight allow users to do? (Select TWO).

A.

Schedule automated data backups.

B.

Explore each step of an executed query.

C.

Monitor queries executed by users in an account.

D.

Create and manage user roles and permissions.

E.

Access Snowflake Marketplace to find and integrate datasets.

Full Access
Question # 114

Which command is used to lake away staged files from a Snowflake stage after a successful data ingestion?

A.

DELETE

B.

DROP

C.

REMOVE

D.

TRUNCATE

Full Access
Question # 115

Which system_defined Snowflake role has permission to rename an account and specify whether the original URL can be used to access the renamed account?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 116

Which data protection feature should only be used when all other data recovery options have been attempted?

A.

Time Travel

B.

Cloning

C.

Replication

D.

Fail-safe

Full Access
Question # 117

Which command is used to upload data files from a local directory or folder on a client machine to an internal stage, for a specified table?

A.

GET

B.

PUT

C.

CREATE STREAM

D.

COPY INTO

Full Access
Question # 118

What is the purpose of the use of the VALIDATE command?

A.

To view any queries that encountered an error

B.

To verify that a SELECT query will run without error

C.

To prevent a put statement from running if an error occurs

D.

To see all errors from a previously run COPY INTO

statement

Full Access
statement. This command helps users identify and resolve data loading issues.

    Run the COPY INTO Statement: Execute the COPY INTO

command to load data from a stage into a table.

COPY INTO my_table

FROM @my_stage

FILE_FORMAT = (FORMAT_NAME = 'my_format');

    Validate the Load: Use the VALIDATE function to see if there were any errors during the data load.

SELECT *

FROM TABLE(VALIDATE(my_table, JOB_ID => 'my_copy_job_id'));

    Review Errors: The VALIDATE function will return details about any errors that occurred, such as parsing errors or data type mismatches.

References:

    Snowflake Documentation: Validating Data Loads

    Snowflake Documentation: COPY INTO

Question # 119

While running a query on a virtual warehouse in auto-scale mode, additional clusters are stated immediately if which setting is configured?

A.

MAX_CLUSTER_COUNT is increased and new_max_clusters is greater than running_clusters

B.

MAX_CLUSTER_COUNT is decreased and new_max_clusters is less than running_clusters

C.

MIN_CLUSTER_COUNT is increased and new_min_clusters is greater than running_clusters

D.

MIN_CLUSTER_COUNT is decreased and new_min_clusters is less than running_clusters

Full Access
Question # 120

What are type predicates used for?

A.

Extracting data from a variant column

B.

Casting a value in a variant column to a particular data type

C.

Determining if a value in a variant column is a particular data type

D.

Manipulating objects and arrays in a VARIANT column

Full Access
Question # 121

What is the primary purpose of using a masking policy in Snowflake?

A.

To protect sensitive data from unauthorized access when queries are run.

B.

To automatically encrypt sensitive data when data is stored in Snowflake.

C.

To protect multiple columns that have different data types in a given table.

D.

To protect both column-level and row-level data.

Full Access
Question # 122

Awarding a user which privileges on all virtual warehouses is equivalent to granting the user the global MANAGE WAREHOUSES privilege?

A.

MODIFY, MONITOR and OPERATE privileges

B.

ownership and usage privileges

C.

APPLYBUDGET and audit privileges

D.

MANAGE LISTING ADTOTOLFillment and resolve all privileges

Full Access
Question # 123

If 3 size Small virtual warehouse is made up of two servers, how many servers make up a Large warehouse?

A.

4

B.

8

C.

16

D.

32

Full Access
Question # 124

Which of the following describes a Snowflake stored procedure?

A.

They can be created as secure and hide the underlying metadata from the user.

B.

They can only access tables from a single database.

C.

They can contain only a single SQL statement.

D.

They can be created to run with a caller's rights or an owner's rights.

Full Access
Question # 125

Which of the following statements apply to Snowflake in terms of security? (Choose two.)

A.

Snowflake leverages a Role-Based Access Control (RBAC) model.

B.

Snowflake requires a user to configure an IAM user to connect to the database.

C.

All data in Snowflake is encrypted.

D.

Snowflake can run within a user's own Virtual Private Cloud (VPC).

E.

All data in Snowflake is compressed.

Full Access
Question # 126

What versions of Snowflake should be used to manage compliance with Personal Identifiable Information (PII) requirements? (Choose two.)

A.

Custom Edition

B.

Virtual Private Snowflake

C.

Business Critical Edition

D.

Standard Edition

E.

Enterprise Edition

Full Access
Question # 127

Where can a user find and review the failed logins of a specific user for the past 30 days?

A.

The USERS view in ACCOUNT_USAGE

B.

The LOGIN_HISTORY view in ACCOUNT_USAGE

C.

The ACCESS_HISTORY view in ACCOUNT_USAGE

D.

The SESSIONS view in ACCOUNT_USAGE

Full Access
Question # 128

What occurs when a pipe is recreated using the CREATE OR REPLACE PIPE command?

A.

The Pipe load history is reset to empty.

B.

The REFRESH command is executed.

C.

The stage will be purged.

D.

The destination table is truncated.

Full Access
Question # 129

Which of the following is a data tokenization integration partner?

A.

Protegrity

B.

Tableau

C.

DBeaver

D.

SAP

Full Access
Question # 130

Which command can be used to load data files into a Snowflake stage?

A.

JOIN

B.

COPY INTO

C.

PUT

D.

GET

Full Access
Question # 131

Which command should be used to download files from a Snowflake stage to a local folder on a client's machine?

A.

PUT

B.

GET

C.

COPY

D.

SELECT

Full Access
Question # 132

Which file formats are supported for unloading data from Snowflake? (Choose two.)

A.

Avro

B.

JSON

C.

ORC

D.

XML

E.

Delimited (CSV, TSV, etc.)

Full Access
Question # 133

What is an advantage of using an explain plan instead of the query profiler to evaluate the performance of a query?

A.

The explain plan output is available graphically.

B.

An explain plan can be used to conduct performance analysis without executing a query.

C.

An explain plan will handle queries with temporary tables and the query profiler will not.

D.

An explain plan's output will display automatic data skew optimization information.

Full Access
Question # 134

Which Snowflake feature allows a user to substitute a randomly generated identifier for sensitive data, in order to prevent unauthorized users access to the data, before loading it into Snowflake?

A.

External Tokenization

B.

External Tables

C.

Materialized Views

D.

User-Defined Table Functions (UDTF)

Full Access
Question # 135

What types of data listings are available in the Snowflake Data Marketplace? (Choose two.)

A.

Reader

B.

Consumer

C.

Vendor

D.

Standard

E.

Personalized

Full Access
Question # 136

When loading data into Snowflake via Snowpipe what is the compressed file size recommendation?

A.

10-50 MB

B.

100-250 MB

C.

300-500 MB

D.

1000-1500 MB

Full Access
Question # 137

Which statement is true about running tasks in Snowflake?

A.

A task can be called using a CALL statement to run a set of predefined SQL commands.

B.

A task allows a user to execute a single SQL statement/command using a predefined schedule.

C.

A task allows a user to execute a set of SQL commands on a predefined schedule.

D.

A task can be executed using a SELECT statement to run a predefined SQL command.

Full Access
Question # 138

A Snowflake Administrator needs to ensure that sensitive corporate data in Snowflake tables is not visible to end users, but is partially visible to functional managers.

How can this requirement be met?

A.

Use data encryption.

B.

Use dynamic data masking.

C.

Use secure materialized views.

D.

Revoke all roles for functional managers and end users.

Full Access
Question # 139

Which command should be used to load data from a file, located in an external stage, into a table in Snowflake?

A.

INSERT

B.

PUT

C.

GET

D.

COPY

Full Access
Question # 140

In the Snowflake access control model, which entity owns an object by default?

A.

The user who created the object

B.

The SYSADMIN role

C.

Ownership depends on the type of object

D.

The role used to create the object

Full Access
Question # 141

When cloning a database, what is cloned with the database? (Choose two.)

A.

Privileges on the database

B.

Existing child objects within the database

C.

Future child objects within the database

D.

Privileges on the schemas within the database

E.

Only schemas and tables within the database

Full Access
Question # 142

Which of the following are characteristics of Snowflake virtual warehouses? (Choose two.)

A.

Auto-resume applies only to the last warehouse that was started in a multi-cluster warehouse.

B.

The ability to auto-suspend a warehouse is only available in the Enterprise edition or above.

C.

SnowSQL supports both a configuration file and a command line option for specifying a default warehouse.

D.

A user cannot specify a default warehouse when using the ODBC driver.

E.

The default virtual warehouse size can be changed at any time.

Full Access
Question # 143

How should a virtual warehouse be configured if a user wants to ensure that additional multi-clusters are resumed with no delay?

A.

Configure the warehouse to a size larger than generally required

B.

Set the minimum and maximum clusters to autoscale

C.

Use the standard warehouse scaling policy

D.

Use the economy warehouse scaling policy

Full Access
Question # 144

Which minimum Snowflake edition allows for a dedicated metadata store?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 145

How can a row access policy be applied to a table or a view? (Choose two.)

A.

Within the policy DDL

B.

Within the create table or create view DDL

C.

By future APPLY for all objects in a schema

D.

Within a control table

E.

Using the command ALTER ADD ROW ACCESS POLICY ;

Full Access

 statement within a pipe object to load data from files as soon as they are available in a stage. Snowpipe does not execute UDFs, stored procedures, or insert statements. References: Snowpipe | Snowflake Documentation

Question # 166

Which of the following are benefits of micro-partitioning? (Select TWO)

A.

Micro-partitions cannot overlap in their range of values

B.

Micro-partitions are immutable objects that support the use of Time Travel.

C.

Micro-partitions can reduce the amount of I/O from object storage to virtual warehouses

D.

Rows are automatically stored in sorted order within micro-partitions

E.

Micro-partitions can be defined on a schema-by-schema basis

Full Access
Question # 167

What is the recommended file sizing for data loading using Snowpipe?

A.

A compressed file size greater than 100 MB, and up to 250 MB

B.

A compressed file size greater than 100 GB, and up to 250 GB

C.

A compressed file size greater than 10 MB, and up to 100 MB

D.

A compressed file size greater than 1 GB, and up to 2 GB

Full Access
Question # 168

How often are encryption keys automatically rotated by Snowflake?

A.

30 Days

B.

60 Days

C.

90 Days

D.

365 Days

Full Access
Question # 169

What happens to the underlying table data when a CLUSTER BY clause is added to a Snowflake table?

A.

Data is hashed by the cluster key to facilitate fast searches for common data values

B.

Larger micro-partitions are created for common data values to reduce the number of partitions that must be scanned

C.

Smaller micro-partitions are created for common data values to allow for more parallelism

D.

Data may be colocated by the cluster key within the micro-partitions to improve pruning performance

Full Access
Question # 170

What happens when a virtual warehouse is resized?

A.

When increasing the size of an active warehouse the compute resource for all running and queued queries on the warehouse are affected

B.

When reducing the size of a warehouse the compute resources are removed only when they are no longer being used to execute any current statements.

C.

The warehouse will be suspended while the new compute resource is provisioned and will resume automatically once provisioning is complete.

D.

Users who are trying to use the warehouse will receive an error message until the resizing is complete

Full Access
Question # 171

The Information Schema and Account Usage Share provide storage information for which of the following objects? (Choose three.)

A.

Users

B.

Tables

C.

Databases

D.

Internal Stages

Full Access
Question # 172

During periods of warehouse contention which parameter controls the maximum length of time a warehouse will hold a query for processing?

A.

STATEMENT_TIMEOUT__IN__SECONDS

B.

STATEMENT_QUEUED_TIMEOUT_IN_SECONDS

C.

MAX_CONCURRENCY__LEVEL

D.

QUERY_TIMEOUT_IN_SECONDS

Full Access
Question # 173

What can be used to view warehouse usage over time? (Select Two).

A.

The load HISTORY view

B.

The Query history view

C.

The show warehouses command

D.

The WAREHOUSE_METERING__HISTORY View

E.

The billing and usage tab in the Snowflake web Ul

Full Access
Question # 174

True or False: Loading data into Snowflake requires that source data files be no larger than 16MB.

A.

True

B.

False

Full Access
Question # 175

Which Snowflake object enables loading data from files as soon as they are available in a cloud storage location?

A.

Pipe

B.

External stage

C.

Task

D.

Stream

Full Access
Question # 176

What is a machine learning and data science partner within the Snowflake Partner Ecosystem?

A.

Informatica

B.

Power Bl

C.

Adobe

D.

Data Robot

Full Access
Question # 177

Which of the following objects can be shared through secure data sharing?

A.

Masking policy

B.

Stored procedure

C.

Task

D.

External table

Full Access
Question # 178

Which stage type can be altered and dropped?

A.

Database stage

B.

External stage

C.

Table stage

D.

User stage

Full Access
Question # 179

What feature can be used to reorganize a very large table on one or more columns?

A.

Micro-partitions

B.

Clustering keys

C.

Key partitions

D.

Clustered partitions

Full Access
Question # 180

What is a key feature of Snowflake architecture?

A.

Zero-copy cloning creates a mirror copy of a database that updates with the original

B.

Software updates are automatically applied on a quarterly basis

C.

Snowflake eliminates resource contention with its virtual warehouse implementation

D.

Multi-cluster warehouses allow users to run a query that spans across multiple clusters

E.

Snowflake automatically sorts DATE columns during ingest for fast retrieval by date

Full Access
Question # 181

What happens when a cloned table is replicated to a secondary database? (Select TWO)

A.

A read-only copy of the cloned tables is stored.

B.

The replication will not be successful.

C.

The physical data is replicated

D.

Additional costs for storage are charged to a secondary account

E.

Metadata pointers to cloned tables are replicated

Full Access
Question # 182

When is the result set cache no longer available? (Select TWO)

A.

When another warehouse is used to execute the query

B.

When another user executes the query

C.

When the underlying data has changed

D.

When the warehouse used to execute the query is suspended

E.

When it has been 24 hours since the last query

Full Access
Question # 183

Which services does the Snowflake Cloud Services layer manage? (Select TWO).

A.

Compute resources

B.

Query execution

C.

Authentication

D.

Data storage

E.

Metadata

Full Access
Question # 184

A sales table FCT_SALES has 100 million records.

The following Query was executed

SELECT COUNT (1) FROM FCT__SALES;

How did Snowflake fulfill this query?

A.

Query against the result set cache

B.

Query against a virtual warehouse cache

C.

Query against the most-recently created micro-partition

D.

Query against the metadata excite

Full Access
Question # 185

Which Snowflake partner specializes in data catalog solutions?

A.

Alation

B.

DataRobot

C.

dbt

D.

Tableau

Full Access
Question # 186

True or False: When you create a custom role, it is a best practice to immediately grant that role to ACCOUNTADMIN.

A.

True

B.

False

Full Access
Question # 187

Which of the following Snowflake features provide continuous data protection automatically? (Select TWO).

A.

Internal stages

B.

Incremental backups

C.

Time Travel

D.

Zero-copy clones

E.

Fail-safe

Full Access
Question # 188

A marketing co-worker has requested the ability to change a warehouse size on their medium virtual warehouse called mktg__WH.

Which of the following statements will accommodate this request?

A.

ALLOW RESIZE ON WAREHOUSE MKTG__WH TO USER MKTG__LEAD;

B.

GRANT MODIFY ON WAREHOUSE MKTG WH TO ROLE MARKETING;

C.

GRANT MODIFY ON WAREHOUSE MKTG__WH TO USER MKTG__LEAD;

D.

GRANT OPERATE ON WAREHOUSE MKTG WH TO ROLE MARKETING;

Full Access
Question # 189

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?

A.

The primary cluster in the virtual warehouse

B.

The entire virtual warehouse

C.

The database in which the virtual warehouse resides

D.

The Queries currently being run on the virtual warehouse

Full Access
Question # 190

In which scenarios would a user have to pay Cloud Services costs? (Select TWO).

A.

Compute Credits = 50 Credits Cloud Services = 10

B.

Compute Credits = 80 Credits Cloud Services = 5

C.

Compute Credits = 10 Credits Cloud Services = 9

D.

Compute Credits = 120 Credits Cloud Services = 10

E.

Compute Credits = 200 Credits Cloud Services = 26

Full Access
Question # 191

Which of the following are best practice recommendations that should be considered when loading data into Snowflake? (Select TWO).

A.

Load files that are approximately 25 MB or smaller.

B.

Remove all dates and timestamps.

C.

Load files that are approximately 100-250 MB (or larger)

D.

Avoid using embedded characters such as commas for numeric data types

E.

Remove semi-structured data types

Full Access
Question # 192

How can a user change which columns are referenced in a view?

A.

Modify the columns in the underlying table

B.

Use the ALTER VIEW command to update the view

C.

Recreate the view with the required changes

D.

Materialize the view to perform the changes

Full Access
Question # 193

What type of columns does Snowflake recommend to be used as clustering keys? (Select TWO).

A.

A VARIANT column

B.

A column with very low cardinality

C.

A column with very high cardinality

D.

A column that is most actively used in selective filters

E.

A column that is most actively used in join predicates

Full Access
Question # 194

Which data type can store more than one type of data structure?

A.

JSON

B.

BINARY

C.

VARCHAR

D.

VARIANT

Full Access
Question # 195

The bulk data load history that is available upon completion of the COPY statement is stored where and for how long?

A.

In the metadata of the target table for 14 days

B.

In the metadata of the pipe for 14 days

C.

In the metadata of the target table for 64 days

D.

In the metadata of the pipe for 64 days

Full Access
Question # 196

Which TABLE function helps to convert semi-structured data to a relational representation?

A.

CHECK_JSON

B.

TO_JSON

C.

FLATTEN

D.

PARSE_JSON

Full Access
Question # 197

What is the recommended way to change the existing file format type in my format from CSV to JSON?

A.

ALTER FILE FORMAT my_format SET TYPE=JSON;

B.

ALTER FILE FORMAT my format SWAP TYPE WITH JSON;

C.

CREATE OR REPLACE FILE FORMAT my format TYPE-JSON;

D.

REPLACE FILE FORMAT my format TYPE-JSON;

Full Access
Question # 198

Which command is used to unload files from an internal or external stage to a local file system?

A.

COPY INTO

B.

GET

C.

PUT

D.

TRANSFER

Full Access
Question # 199

What is the difference between a stored procedure and a User-Defined Function (UDF)?

A.

Stored procedures can execute database operations while UDFs cannot.

B.

Returning a value is required in a stored procedure while returning values in a UDF is optional.

C.

Values returned by a stored procedure can be used directly in a SQL statement while the values returned by a UDF cannot.

D.

Multiple stored procedures can be called as part of a single executable statement while a single SQL statement can only call one UDF at a time.

Full Access
Question # 200

Which languages requite that User-Defined Function (UDF) handlers be written inline? (Select TWO).

A.

Java

B.

Javascript

C.

Scala

D.

Python

E.

SQL

Full Access
Question # 201

Credit charges for Snowflake virtual warehouses are calculated based on which of the following considerations? (Choose two.)

A.

The number of queries executed

B.

The number of active users assigned to the warehouse

C.

The size of the virtual warehouse

D.

The length of time the warehouse is running

E.

The duration of the queries that are executed

Full Access
Question # 202

Which feature allows a user the ability to control the organization of data in a micro-partition?

A.

Range Partitioning

B.

Search Optimization Service

C.

Automatic Clustering

D.

Horizontal Partitioning

Full Access
Question # 203

Which clients does Snowflake support Multi-Factor Authentication (MFA) token caching for? (Select TWO).

A.

GO driver

B.

Node.js driver

C.

ODBC driver

D.

Python connector

E.

Spark connector

Full Access
Question # 204

Which of the following practices are recommended when creating a user in Snowflake? (Choose two.)

A.

Configure the user to be initially disabled.

B.

Force an immediate password change.

C.

Set a default role for the user.

D.

Set the number of minutes to unlock to 15 minutes.

E.

Set the user's access to expire within a specified timeframe.

Full Access
Question # 205

Which of the following activities consume virtual warehouse credits in the Snowflake environment? (Choose two.)

A.

Caching query results

B.

Running EXPLAIN and SHOW commands

C.

Cloning a database

D.

Running a custom query

E.

Running COPY commands

Full Access
Question # 206

What is the name of the SnowSQLfile that can store connection information?

A.

history

B.

config

C.

snowsqLcnf

D.

snowsql.pubkey

Full Access
Question # 207

Which parameter can be used to instruct a COPY command to verify data files instead of loading them into a specified table?

A.

STRIP_NULL_VALUES

B.

SKIP_BYTE_ORDER_MARK

C.

REPLACE_INVALID_CHARACTERS

D.

VALIDATION_MODE

Full Access