Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

The following JSON is stored in a VARIANT column called src of the CAR_SALES table:

A user needs to extract the dealership information from the JSON.

How can this be accomplished?

A.

select src:dealership from car_sales;

B.

select src.dealership from car_sales;

C.

select src:Dealership from car_sales;

D.

select dealership from car_sales;

Full Access
Question # 5

The Snowflake Cloud Data Platform is described as having which of the following architectures?

A.

Shared-disk

B.

Shared-nothing

C.

Multi-cluster shared data

D.

Serverless query engine

Full Access
Question # 6

Which of the following statements apply to Snowflake in terms of security? (Choose two.)

A.

Snowflake leverages a Role-Based Access Control (RBAC) model.

B.

Snowflake requires a user to configure an IAM user to connect to the database.

C.

All data in Snowflake is encrypted.

D.

Snowflake can run within a user's own Virtual Private Cloud (VPC).

E.

All data in Snowflake is compressed.

Full Access
Question # 7

By default, which role has access to the SYSTEM$GLOBAL_ACCOUNT_SET_PARAMETER function?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 8

By default, how long is the standard retention period for Time Travel across all Snowflake accounts?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 9

What are advantages clones have over tables created with CREATE TABLE AS SELECT statement? (Choose two.)

A.

The clone always stays in sync with the original table.

B.

The clone has better query performance.

C.

The clone is created almost instantly.

D.

The clone will have time travel history from the original table.

E.

The clone saves space by not duplicating storage.

Full Access
Question # 10

What is true about sharing data in Snowflake? (Choose two.)

A.

The Data Consumer pays for data storage as well as for data computing.

B.

The shared data is copied into the Data Consumer account, so the Consumer can modify it without impacting the base data of the Provider.

C.

A Snowflake account can both provide and consume shared data.

D.

The Provider is charged for compute resources used by the Data Consumer to query the shared data.

E.

The Data Consumer pays only for compute resources to query the shared data.

Full Access
Question # 11

When using the ALLOW_CLI£NT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 12

Which feature is integrated to support Multi-Factor Authentication (MFA) at Snowflake?

A.

Authy

B.

Duo Security

C.

One Login

D.

RSA SecurlD Access

Full Access
Question # 13

How can a user get the MOST detailed information about individual table storage details in Snowflake?

A.

SHOW TABLES command

B.

SHOW EXTERNAL TABLES command

C.

TABLES view

D.

TABLE STORAGE METRICS view

Full Access
Question # 14

Which Snowflake edition offers the highest level of security for organizations that have the strictest requirements?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 15

Which languages requite that User-Defined Function (UDF) handlers be written inline? (Select TWO).

A.

Java

B.

Javascript

C.

Scala

D.

Python

E.

SQL

Full Access
Question # 16

Which privilege is required for a role to be able to resume a suspended warehouse if auto-resume is not enabled?

A.

USAGE

B.

OPERATE

C.

MONITOR

D.

MODIFY

Full Access
Question # 17

When should a user consider disabling auto-suspend for a virtual warehouse? (Select TWO).

A.

When users will be using compute at different times throughout a 24/7 period

B.

When managing a steady workload

C.

When the compute must be available with no delay or lag time

D.

When the user does not want to have to manually turn on the warehouse each time it is needed

E.

When the warehouse is shared across different teams

Full Access
Question # 18

Which URL provides access to files in Snowflake without authorization?

A.

File URL

B.

Scoped URL

C.

Pre-signed URL

D.

Scoped file URL

Full Access
Question # 19

Which Snowflake data type is used to store JSON key value pairs?

A.

TEXT

B.

BINARY

C.

STRING

D.

VARIANT

Full Access
Question # 20

How does a Snowflake user extract the URL of a directory table on an external stage for further transformation?

A.

Use the SHOW STAGES command.

B.

Use the DESCRIBE STAGE command.

C.

Use the GET_ABSOLUTE_PATH function.

D.

Use the GET_STAGE_LOCATION function.

Full Access
Question # 21

What are valid sub-clauses to the OVER clause for a window function? (Select TWO).

A.

GROUP BY

B.

LIMIT

C.

ORDER BY

D.

PARTITION BY

E.

UNION ALL

Full Access
Question # 22

Which data formats are supported by Snowflake when unloading semi-structured data? (Select TWO).

A.

Binary file in Avro

B.

Binary file in Parquet

C.

Comma-separated JSON

D.

Newline Delimited JSON

E.

Plain text file containing XML elements

Full Access
Question # 23

How does Snowflake reorganize data when it is loaded? (Select TWO).

A.

Binary format

B.

Columnar format

C.

Compressed format

D.

Raw format

E.

Zipped format

Full Access
Question # 24

What information does the Query Profile provide?

A.

Graphical representation of the data model

B.

Statistics for each component of the processing plan

C.

Detailed Information about I he database schema

D.

Real-time monitoring of the database operations

Full Access
Question # 25

How can a user get the MOST detailed information about individual table storage details in Snowflake?

A.

SHOW TABLES command

B.

SHOW EXTERNAL TABLES command

C.

TABLES view

D.

TABLE STORAGE METRICS view

Full Access
Question # 26

What type of function returns one value for each Invocation?

A.

Aggregate

B.

Scalar

C.

Table

D.

Window

Full Access
Question # 27

What is the Fail-safe retention period for transient and temporary tables?

A.

0 days

B.

1 day

C.

7 days

D.

90 days

Full Access
Question # 28

What is the Fail-safe period for a transient table in the Snowflake Enterprise edition and higher?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 29

Which function should be used to insert JSON format string data inot a VARIANT field?

A.

FLATTEN

B.

CHECK_JSON

C.

PARSE_JSON

D.

TO_VARIANT

Full Access
Question # 30

What happens when a network policy includes values that appear in both the allowed and blocked IP address list?

A.

Those IP addresses are allowed access to the Snowflake account as Snowflake applies the allowed IP address list first.

B.

Those IP addresses are denied access lei the Snowflake account as Snowflake applies the blocked IP address list first.

C.

Snowflake issues an alert message and adds the duplicate IP address values lo both 'he allowed and blocked IP address lists.

D.

Snowflake issues an error message and adds the duplicate IP address values to both the allowed and blocked IP address list

Full Access
Question # 31

Which view can be used to determine if a table has frequent row updates or deletes?

A.

TABLES

B.

TABLE_STORAGE_METRICS

C.

STORAGE_DAILY_HISTORY

D.

STORAGE USAGE

Full Access
Question # 32

Which Snowflake layer is associated with virtual warehouses?

A.

Cloud services

B.

Query processing

C.

Elastic memory

D.

Database storage

Full Access
Question # 33

The effects of query pruning can be observed by evaluating which statistics? (Select TWO).

A.

Partitions scanned

B.

Partitions total

C.

Bytes scanned

D.

Bytes read from result

E.

Bytes written

Full Access
Question # 34

What criteria does Snowflake use to determine the current role when initiating a session? (Select TWO).

A.

If a role was specified as part of the connection and that role has been granted to the Snowflake user, the specified role becomes the current role.

B.

If no role was specified as part of the connection and a default role has been defined for the Snowflake user, that role becomes the current role.

C.

If no role was specified as part of the connection and a default role has not been set for the Snowflake user, the session will not be initiated and the log in will fail.

D.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, it will be ignored and the default role will become the current role.

E.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, the role is automatically granted and it becomes the current role.

Full Access
Question # 35

When referring to User-Defined Function (UDF) names in Snowflake, what does the term overloading mean?

A.

There are multiple SOL UDFs with the same names and the same number of arguments.

B.

There are multiple SQL UDFs with the same names and the same number of argument types.

C.

There are multiple SQL UDFs with the same names but with a different number of arguments or argument types.

D.

There are multiple SQL UDFs with different names but the same number of arguments or argument types.

Full Access
Question # 36

Which SQL command can be used to verify the privileges that are granted to a role?

A.

SHOW GRANTS ON ROLE

B.

SHOW ROLES

C.

SHOW GRANTS TO ROLE

D.

SHOW GRANTS FOR ROLE

Full Access
Question # 37

How does Snowflake describe its unique architecture?

A.

A single-cluster shared data architecture using a central data repository and massively parallel processing (MPP)

B.

A multi-duster shared nothing architecture using a soloed data repository and massively parallel processing (MPP)

C.

A single-cluster shared nothing architecture using a sliced data repository and symmetric multiprocessing (SMP)

D.

A multi-cluster shared nothing architecture using a siloed data repository and symmetric multiprocessing (SMP)

Full Access
Question # 38

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

Full Access
Question # 39

There are two Snowflake accounts in the same cloud provider region: one is production and the other is non-production. How can data be easily transferred from the production account to the non-production account?

A.

Clone the data from the production account to the non-production account.

B.

Create a data share from the production account to the non-production account.

C.

Create a subscription in the production account and have it publish to the non-production account.

D.

Create a reader account using the production account and link the reader account to the non-production account.

Full Access
Question # 40

Which objects together comprise a namespace in Snowflake? (Select TWO).

A.

Account

B.

Database

C.

Schema

D.

Table

E.

Virtual warehouse

Full Access
Question # 41

What service is provided as an integrated Snowflake feature to enhance Multi-Factor Authentication (MFA) support?

A.

Duo Security

B.

OAuth

C.

Okta

D.

Single Sign-On (SSO)

Full Access
Question # 42

What can a Snowflake user do with the information included in the details section of a Query Profile?

A.

Determine the total duration of the query.

B.

Determine the role of the user who ran the query.

C.

Determine the source system that the queried table is from.

D.

Determine if the query was on structured or semi-structured data.

Full Access
Question # 43

What will happen if a Snowflake user increases the size of a suspended virtual warehouse?

A.

The provisioning of new compute resources for the warehouse will begin immediately.

B.

The warehouse will remain suspended but new resources will be added to the query acceleration service.

C.

The provisioning of additional compute resources will be in effect when the warehouse is next resumed.

D.

The warehouse will resume immediately and start to share the compute load with other running virtual warehouses.

Full Access
Question # 44

What is used to denote a pre-computed data set derived from a SELECT query specification and stored for later use?

A.

View

B.

Secure view

C.

Materialized view

D.

External table

Full Access
Question # 45

What are the benefits of the replication feature in Snowflake? (Select TWO).

A.

Disaster recovery

B.

Time Travel

C.

Fail-safe

D.

Database failover and fallback

E.

Data security

Full Access
Question # 46

What is the MAXIMUM number of clusters that can be provisioned with a multi-cluster virtual warehouse?

A.

1

B.

5

C.

10

D.

100

Full Access
Question # 47

Which command should be used to unload all the rows from a table into one or more files in a named stage?

A.

COPY INTO

B.

GET

C.

INSERT INTO

D.

PUT

Full Access
Question # 48

A user has semi-structured data to load into Snowflake but is not sure what types of operations will need to be performed on the data. Based on this situation, what type of column does Snowflake recommend be used?

A.

ARRAY

B.

OBJECT

C.

TEXT

D.

VARIANT

Full Access
Question # 49

When floating-point number columns are unloaded to CSV or JSON files, Snowflake truncates the values to approximately what?

A.

(12,2)

B.

(10,4)

C.

(14,8)

D.

(15,9)

Full Access
Question # 50

Which parameter prevents streams on tables from becoming stale?

A.

MAXDATAEXTENSIONTIMEINDAYS

B.

MTN_DATA_RETENTION_TTME_TN_DAYS

C.

LOCK_TIMEOUT

D.

STALE_AFTER

Full Access
Question # 51

User INQUISITIVE_PERSON has been granted the role DATA_SCIENCE. The role DATA_SCIENCE has privileges OWNERSHIP on the schema MARKETING of the database ANALYTICS_DW.

Which command will show all privileges granted to that schema?

A.

SHOW GRANTS ON ROLE DATA_SCIENCE

B.

SHOW GRANTS ON SCHEMA ANALYTICS_DW.MARKETING

C.

SHOW GRANTS TO USER INQUISITIVE_PERSON

D.

SHOW GRANTS OF ROLE DATA_SCIENCE

Full Access
Question # 52

A view is defined on a permanent table. A temporary table with the same name is created in the same schema as the referenced table. What will the query from the view return?

A.

The data from the permanent table.

B.

The data from the temporary table.

C.

An error stating that the view could not be compiled.

D.

An error stating that the referenced object could not be uniquely identified.

Full Access
Question # 53

Snowflake's hierarchical key mode includes which keys? (Select TWO).

A.

Account master keys

B.

Database master keys

C.

File keys

D.

Secure view keys

E.

Schema master keys

Full Access
Question # 54

Data storage for individual tables can be monitored using which commands and/or objects? (Choose two.)

A.

SHOW STORAGE BY TABLE;

B.

SHOW TABLES;

C.

Information Schema -> TABLE_HISTORY

D.

Information Schema -> TABLE_FUNCTION

E.

Information Schema -> TABLE_STORAGE_METRICS

Full Access
Question # 55

What is a responsibility of Snowflake’s virtual warehouses?

A.

Infrastructure management

B.

Metadata management

C.

Query execution

D.

Query parsing and optimization

E.

Permanent storage of micro-partitions

Full Access
Question # 56

Which statement describes how Snowflake supports reader accounts?

A.

A reader account can consume data from the provider account that created it and combine it with its own data.

B.

A consumer needs to become a licensed Snowflake customer as data sharing is only supported between Snowflake accounts.

C.

The users in a reader account can query data that has been shared with the reader account and can perform DML tasks.

D.

The SHOW MANAGED ACCOUNTS command will view all the reader accounts that have been created for an account.

Full Access
Question # 57

Which kind of Snowflake table stores file-level metadata for each file in a stage?

A.

Directory

B.

External

C.

Temporary

D.

Transient

Full Access
Question # 58

Which of the following is the Snowflake Account_Usage.Metering_History view used for?

A.

Gathering the hourly credit usage for an account

B.

Compiling an account's average cloud services cost over the previous month

C.

Summarizing the throughput of Snowpipe costs for an account

D.

Calculating the funds left on an account's contract

Full Access
Question # 59

Which stream type can be used for tracking the records in external tables?

A.

Append-only

B.

External

C.

Insert-only

D.

Standard

Full Access
Question # 60

What type of columns does Snowflake recommend to be used as clustering keys? (Select TWO).

A.

A VARIANT column

B.

A column with very low cardinality

C.

A column with very high cardinality

D.

A column that is most actively used in selective filters

E.

A column that is most actively used in join predicates

Full Access
Question # 61

Which URL type allows users to access unstructured data without authenticating into Snowflake or passing an authorization token?

A.

Pre-signed URL

B.

Scoped URL

C.

Signed URL

D.

File URL

Full Access
Question # 62

Why would a Snowflake user decide to use a materialized view instead of a regular view?

A.

The base tables do not change frequently.

B.

The results of the view change often.

C.

The query is not resource intensive.

D.

The query results are not used frequently.

Full Access
Question # 63

What is used to diagnose and troubleshoot network connections to Snowflake?

A.

SnowCD

B.

Snowpark

C.

Snowsight

D.

SnowSQL

Full Access
Question # 64

What is the name of the SnowSQLfile that can store connection information?

A.

history

B.

config

C.

snowsqLcnf

D.

snowsql.pubkey

Full Access
Question # 65

What can a Snowflake user do in the Activity section in Snowsight?

A.

Create dashboards.

B.

Write and run SQL queries.

C.

Explore databases and objects.

D.

Explore executed query performance.

Full Access
Question # 66

A Snowflake user has been granted the create data EXCHANGE listing privilege with their role.

Which tasks can this user now perform on the Data Exchange? (Select TWO).

A.

Rename listings.

B.

Delete provider profiles.

C.

Modify listings properties.

D.

Modify incoming listing access requests.

E.

Submit listings for approval/publishing.

Full Access
Question # 67

Which features make up Snowflake's column level security? (Select TWO).

A.

Continuous Data Protection (CDP)

B.

Dynamic Data Masking

C.

External Tokenization

D.

Key pair authentication

E.

Row access policies

Full Access
Question # 68

What is the MINIMUM Snowflake edition required to use the periodic rekeying of micro-partitions?

A.

Enterprise

B.

Business Critical

C.

Standard

D.

Virtual Private Snowflake

Full Access
Question # 69

How does Snowflake allow a data provider with an Azure account in central Canada to share data with a data consumer on AWS in Australia?

A.

The data provider in Azure Central Canada can create a direct share to AWS Asia Pacific, if they are both in the same organization.

B.

The data consumer and data provider can form a Data Exchange within the same organization to create a share from Azure Central Canada to AWS Asia Pacific.

C.

The data provider uses the GET DATA workflow in the Snowflake Data Marketplace to create a share between Azure Central Canada and AWS Asia Pacific.

D.

The data provider must replicate the database to a secondary account in AWS Asia Pacific within the same organization then create a share to the data consumer's account.

Full Access
Question # 70

What is a characteristic of the Snowflake Query Profile?

A.

It can provide statistics on a maximum number of 100 queries per week.

B.

It provides a graphic representation of the main components of the query processing.

C.

It provides detailed statistics about which queries are using the greatest number of compute resources.

D.

It can be used by third-party software using the Query Profile API.

Full Access
Question # 71

Which query profile statistics help determine if efficient pruning is occurring? (Choose two.)

A.

Bytes sent over network

B.

Percentage scanned from cache

C.

Partitions total

D.

Bytes spilled to local storage

E.

Partitions scanned

Full Access
Question # 72

Which Snowflake feature will allow small volumes of data to continuously load into Snowflake and will incrementally make the data available for analysis?

A.

COPY INTO

B.

CREATE PIPE

C.

INSERT INTO

D.

TABLE STREAM

Full Access
Question # 73

Which stages are used with the Snowflake PUT command to upload files from a local file system? (Choose three.)

A.

Schema Stage

B.

User Stage

C.

Database Stage

D.

Table Stage

E.

External Named Stage

F.

Internal Named Stage

Full Access
Question # 74

What action can a user take to address query concurrency issues?

A.

Enable the query acceleration service.

B.

Enable the search optimization service.

C.

Add additional clusters to the virtual warehouse

D.

Resize the virtual warehouse to a larger instance size.

Full Access
Question # 75

Which native data types are used for storing semi-structured data in Snowflake? (Select TWO)

A.

NUMBER

B.

OBJECT

C.

STRING

D.

VARCHAR

E.

VARIANT

Full Access
Question # 76

A materialized view should be created when which of the following occurs? (Choose two.)

A.

There is minimal cost associated with running the query.

B.

The query consumes many compute resources every time it runs.

C.

The base table gets updated frequently.

D.

The query is highly optimized and does not consume many compute resources.

E.

The results of the query do not change often and are used frequently.

Full Access
Question # 77

What persistent data structures are used by the search optimization service to improve the performance of point lookups?

A.

Micro-partitions

B.

Clustering keys

C.

Equality searches

D.

Search access paths

Full Access
Question # 78

Which type of role can be granted to a share?

A.

Account role

B.

Custom role

C.

Database role

D.

Secondary role

Full Access
Question # 79

The property mins_to_bypass_network_policy is set at which level?

A.

User

B.

Role

C.

Account

D.

Organization

Full Access
Question # 80

Which Snowflake native tool can be used to diagnose and troubleshoot network connections?

A.

SnowSQL

B.

Snowflake Python connector

C.

Snowsight

D.

SnowCD

Full Access
Question # 81

What is the PRIMARY factor that determines the cost of using a virtual warehouse in Snowflake?

A.

The type of SQL statements executed

B.

The number of tables or databases queried

C.

The amount of data stored in the warehouse

D.

The length of time the compute resources in each cluster run

Full Access
Question # 82

Which views are included in the data_sharing_usage schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 83

When a Snowflake user loads CSV data from a stage, which copy into

command guideline should they follow?

A.

The CSV field delimiter must be a comma character (*,"),

B.

The number of columns in each row should be consistent.

C.

The data file in the stage must be in a compressed format.

D.

The data file must have the same number of columns as the target table.

Full Access
Question # 84

Authorization to execute CREATE statements comes only from which role?

A.

Primary role

B.

Secondary role

C.

Application role

D.

Database role

Full Access
Question # 85

Given the statement template below, which database objects can be added to a share?(Select TWO).

GRANT ON To SHARE ;

A.

Secure functions

B.

Stored procedures

C.

Streams

D.

Tables

E.

Tasks

Full Access
Question # 86

How does Snowflake define i1s approach to Discretionary Access Control (DAC)?

A.

A defined level of access to an object

B.

An entity in which access can be granted

C.

Each object has an owner, who can in turn grail access to that object.

D.

Access privileges are assigned to roles. which are in turn assigned to use's

Full Access
Question # 87

Which features could be used to improve the performance of queries that return a small subset of rows from a large table? (Select TWO).

A.

Search optimization service

B.

Automatic clustering

C.

Row access policies

D.

Multi-cluster virtual warehouses

E.

Secure views

Full Access
Question # 88

Which function returns the URL of a stage using the stage name as the input?

A.

BUILD_STAGE_FILE_URL

B.

BUILD_SCOPED_FILE_URL

C.

GET_PRESIGNED_URL

D.

GET STAGE LOCATION

Full Access
Question # 89

Which command can be used to list all network policies available in an account?

A.

DESCRIBE SESSION POLICY

B.

DESCRIBE NETWORK POLICY

C.

SHOW SESSION POLICIES

D.

SHOW NETWORK POLICIES

Full Access
Question # 90

How can the Query Profile be used to troubleshoot a problematic query?

A.

It will indicate if a virtual warehouse memory is too small to run the query

B.

It will indicate if a user lacks the privileges needed to run the query.

C.

It will indicate if a virtual warehouse is in auto-scale mode

D.

It will indicate if the user has enough Snowflake credits to run the query

Full Access
Question # 91

Which role must be used to create resource monitors?

A.

SECURITYADMIN

B.

ACCOUNTADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 92

What happens when a suspended virtual warehouse is resized in Snowflake?

A.

It will return an error.

B.

It will return a warning.

C.

The suspended warehouse is resumed and new compute resources are provisioned immediately.

D.

The additional compute resources are provisioned when the warehouse is resumed.

Full Access
Question # 93

What action should be taken if a Snowflake user wants to share a newly created object in a database with consumers?

A.

Use the automatic sharing feature for seamless access.

B.

Drop the object and then re-add it to the database to trigger sharing.

C.

Recreate the object with a different name in the database before sharing.

D.

Use the grant privilege ... TO share command to grant the necessary privileges.

Full Access
Question # 94

Which activities are managed by Slowflake's Cloud Services layer? (Select TWO).

A.

Authorisation

B.

Access delegation

C.

Data pruning

D.

Data compression

E.

Query parsing and optimization

Full Access
Question # 95

What is the MINIMUM Snowflake edition that must be used in order to see the ACCESS_HISTORY view?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 96

What are potential impacts of storing non-native values like dates and timestamps in a variant column in Snowflake?

A.

Faster query performance and increased storage consumption

B.

Slower query performance and increased storage consumption

C.

Faster query performance and decreased storage consumption

D.

Slower query performance and decreased storage consumption

Full Access
Question # 97

What does Snowflake attempt to do if any of the compute resources for a virtual warehouse fail to provision during start-up?

A.

Repair the failed resources.

B.

Restart failed resources.

C.

Queue the failed resources

D.

Provision the failed resources

Full Access
Question # 98

In the Data Exchange, who can get or request data from the listings? (Select TWO).

A.

Users with ACCOUNTADMIN role

B.

Users with sysadmin role

C.

Users with ORGADMIN role

D.

Users with import share privilege

E.

Users with manage grants privilege

Full Access
Question # 99

What Snowflake objects can contain custom application logic written in JavaScript? (Select TWO)

A.

Stored procedures

B.

Stages

C.

Tasks

D.

Views

E.

User-Defined Functions (UDFs)

Full Access
Question # 100

Which access control entity in Snowflake can be created as part of a hierarchy within an account?

A.

Securable object

B.

Role

C.

Privilege

D.

User

Full Access
Question # 101

Which statistics on a Query Profile reflect the efficiency of the query pruning? (Select TWO).

A.

Partitions scanned

B.

Partitions total

C.

Bytes spilled

D.

Bytes scanned

E.

Bytes written

Full Access
Question # 102

What is the benefit of using the STRIP_OUTER_ARRAY parameter with the COPY INTO

command when loading data from a JSON file into a table?

A.

It flattens multiple arrays into a single array.

B.

It removes the outer array structure and loads separate rows of data

C.

It transforms a pivoted table into an array.

D.

It tokenizes each data string using the defined delimiters.

Full Access
command is used when loading data from a JSON file into a table. This parameter removes the outer array structure from the JSON data and loads separate rows of data into the table.

    Understanding the STRIP_OUTER_ARRAY Parameter:

      JSON files often contain data in an array format where multiple records are nested within a single outer array.

      The STRIP_OUTER_ARRAY parameter helps in simplifying the loading process by removing this outer array, allowing each element within the array to be loaded as a separate row in the target table.

    How It Works:

      When the STRIP_OUTER_ARRAY parameter is set to TRUE, Snowflake treats each item within the outer array as an individual record.

      This eliminates the need for additional parsing or transformation steps that would otherwise be required to handle nested arrays.

    Example Usage:

FROM @my_stage/file.json

FILE_FORMAT = (TYPE = 'JSON' STRIP_OUTER_ARRAY = TRUE);

      In this example, the JSON file containing an array of objects is loaded into the table my_table.

      Each object within the array is loaded as a separate row, without the outer array structure.

    Benefits:

      Simplifies data loading: By removing the outer array, the data is directly loaded into the table without additional manipulation.

      Enhances performance: Streamlines the loading process, reducing the complexity and potential errors in handling nested JSON structures.

References:

    Snowflake Documentation: COPY INTO

Snowflake Documentation: JSON File Format Options

Question # 103

What do temporary and transient tables have m common in Snowflake? (Select TWO).

A.

Both tables have no Fail-safe period.

B.

Both tables have data retention period maximums of one day.

C.

Both tables are visible only to a single user session.

D.

For both tables the retention period ends when the tables are dropped.

E.

For both tables, the retention period does not end when the session ends

Full Access
Question # 104

Which table function is used to perform additional processing on the results of a previously-run query?

A.

QUERY_HISTORY

B.

RESULT_SCAN

C.

DESCRIBE_RESULTS

D.

QUERY HISTORY BY SESSION

Full Access
Question # 105

What is the MINIMUM Snowftake edition that supports database replication?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 106

What best practice recommendations will help prevent timeouts when using the PUT command to load large data sets? (Select TWO).

A.

Compress the files before loading.

B.

Use a semi-structured file format.

C.

Increase the PARALLEL option value.

D.

Load the data into a table stage.

E.

Enable the overwrite option.

Full Access
Question # 107

What does the Remote Disk I/O statistic in the Query Profile indicate?

A.

Time spent reading from the result cache.

B.

Time spent reading from the virtual warehouse cache.

C.

Time when the query processing was blocked by remote disk access.

D.

The level of network activity between the Cloud Services layer and the virtual warehouse.

Full Access
Question # 108

A user wants to access stored in a stage without authenticating into Snowflake.

Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

Full Access
Question # 109

Which feature of Snowflake's Continuous Data Protection (CDP) has associated costs?

A.

Fail-safe

B.

Network policies

C.

End-to-end encryption

D.

Multi-Factor Authentication (MFA)

Full Access
Question # 110

Which Snowflake object contains all the information required to share a database?

A.

Private listing

B.

Secure view

C.

Sequence

D.

Share

Full Access
Question # 111

What is a characteristic of a tag associated with a masking policy?

A.

A tag can be dropped after a masking policy is assigned

B.

A tag can have only one masking policy for each data type.

C.

A tag can have multiple masking policies for each data type.

D.

A tag can have multiple masking policies with varying data types

Full Access
Question # 112

What virtual warehouse configuration should be used when processing a large number of complex queries?

A.

Use the auto-resume feature.

B.

Run the warehouse in auto-scale mode.

C.

Increase the size of the warehouse.

D.

Increase the number of warehouse clusters.

Full Access
Question # 113

What will prevent unauthorized access to a Snowflake account from an unknown source?

A.

Network policy

B.

End-to-end encryption

C.

Multi-Factor Authentication (MFA)

D.

Role-Based Access Control (RBAC)

Full Access
Question # 114

How can a Snowflake user validate data that is unloaded using the COPY INTO command?

A.

Load the data into a CSV file.

B.

Load the data into a relational table.

C.

Use the VALlDATlON_MODE - SQL statement.

D.

Use the validation mode = return rows statement.

Full Access
Question # 115

What metadata does Snowflake store for rows in micro-partitions? (Select TWO).

A.

Range of values

B.

Distinct values

C.

Index values

D.

Sorted values

E.

Null values

Full Access
Question # 116

Which data types can be used in Snowflake to store semi-structured data? (Select TWO)

A.

ARRAY

B.

BLOB

C.

CLOB

D.

JSON

E.

VARIANT

Full Access
Question # 117

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.

SELECT

B.

OWNERSHIP

C.

MONITOR

D.

MODIFY

E.

USAGE

Full Access
Question # 118

What information is found within the Statistic output in the Query Profile Overview?

A.

Operator tree

B.

Table pruning

C.

Most expensive nodes

D.

Nodes by execution time

Full Access
Question # 119

Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?

A.

OAuth

B.

Network policies

C.

Single Sign-On (SSO)

D.

Multi-Factor Authentication (MFA)

Full Access
Question # 120

What is the purpose of the Snowflake SPLIT TO_TABLE function?

A.

To count the number of characters in a string

B.

To split a string into an array of sub-strings

C.

To split a string and flatten the results into rows

D.

To split a string and flatten the results into columns

Full Access
Question # 121

What does the LATERAL modifier for the FLATTEN function do?

A.

Casts the values of the flattened data

B.

Extracts the path of the flattened data

C.

Joins information outside the object with the flattened data

D.

Retrieves a single instance of a repeating element in the flattened data

Full Access
Question # 122

What transformations are supported when loading data into a table using the COPY INTO

command? (Select TWO).

A.

Column reordering

B.

Column omission

C.

JOIN function

D.

FLATTEN function

E.

GROUP BY function

Full Access
Question # 123

For which use cases is running a virtual warehouse required? (Select TWO).

A.

When creating a table

B.

When loading data into a table

C.

When unloading data from a table

D.

When executing a show command

E.

When executing a list command

Full Access
Question # 124

A user wants to access files stored in a stage without authenticating into Snowflake. Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

Full Access
Question # 125

When working with a managed access schema, who has the OWNERSHIP privilege of any tables added to the schema?

A.

The database owner

B.

The object owner

C.

The schema owner

D.

The Snowflake user's role

Full Access
Question # 126

Which Snowflake role can manage any object grant globally, including modifying and revoking grants?

A.

USERADMIN

B.

ORGADMIN

C.

SYSADMIN

D.

SECURITYADMIN

Full Access
Question # 127

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.

Bytes scanned

B.

Bytes written to result

C.

Partitions scanned

D.

Partitions total

E.

Percentage scanned from cache

Full Access
Question # 128

A Snowflake account has activated federated authentication.

What will occur when a user with a password that was defined by Snowflake attempts to log in to Snowflake?

A.

The user will be unable to enter a password.

B.

The user will encounter an error, and will not be able to log in.

C.

The user will be able to log into Snowflake successfully.

D.

After entering the username and password, the user will be redirected to an Identity Provider (IdP) login page.

Full Access
Question # 129

A permanent table and temporary table have the same name, TBL1, in a schema.

What will happen if a user executes select * from TBL1 ;?

A.

The temporary table will take precedence over the permanent table.

B.

The permanent table will take precedence over the temporary table.

C.

An error will say there cannot be two tables with the same name in a schema.

D.

The table that was created most recently will take precedence over the older table.

Full Access
Question # 130

Which statements describe benefits of Snowflake's separation of compute and storage? (Select TWO).

A.

The separation allows independent scaling of computing resources.

B.

The separation ensures consistent data encryption across all virtual data warehouses.

C.

The separation supports automatic conversion of semi-structured data into structured data for advanced data analysis.

D.

Storage volume growth and compute usage growth can be tightly coupled.

E.

Compute can be scaled up or down without the requirement to add more storage.

Full Access
Question # 131

Which parameter can be set at the account level to set the minimum number of days for which Snowflake retains historical data in Time Travel?

A.

DATA_RETENTION_TIME_IN_DAYS

B.

MAX_DATA_EXTENSION_TIME_IN_DAYS

C.

MIN_DATA_RETENTION_TIME_IN_DAYS

D.

MAX CONCURRENCY LEVEL

Full Access
Question # 132

Which Snowflake view is used to support compliance auditing?

A.

ACCESS_HISTORY

B.

COPY_HISTORY

C.

QUERY_HISTORY

D.

ROW ACCESS POLICIES

Full Access
Question # 133

What happens to the objects in a reader account when the DROP MANAGED ACCOUNT command is executed?

A.

The objects are dropped.

B.

The objects enter the Fail-safe period.

C.

The objects enter the Time Travel period.

D.

The objects are immediately moved to the provider account.

Full Access
Question # 134

What is a directory table in Snowflake?

A.

A separate database object that is used to store file-level metadata

B.

An object layered on a stage that is used to store file-level metadata

C.

A database object with grantable privileges for unstructured data tasks

D.

A Snowflake table specifically designed for storing unstructured files

Full Access
Question # 135

How can a dropped internal stage be restored?

A.

Enable Time Travel.

B.

Clone the dropped stage.

C.

Execute the UNDROP command.

D.

Recreate the dropped stage.

Full Access
Question # 136

Which type of loop requires a BREAK statement to stop executing?

A.

FOR

B.

LOOP

C.

REPEAT

D.

WHILE

Full Access
Question # 137

A column named "Data" contains VARIANT data and stores values as follows:

How will Snowflake extract the employee's name from the column data?

A.

Data:employee.name

B.

DATA:employee.name

C.

data:Employee.name

D.

data:employee.name

Full Access
Question # 138

What is the purpose of a Query Profile?

A.

To profile how many times a particular query was executed and analyze its u^age statistics over time.

B.

To profile a particular query to understand the mechanics of the query, its behavior, and performance.

C.

To profile the user and/or executing role of a query and all privileges and policies applied on the objects within the query.

D.

To profile which queries are running in each warehouse and identify proper warehouse utilization and sizing for better performance and cost balancing.

Full Access
Question # 139

What are key characteristics of virtual warehouses in Snowflake? (Select TWO).

A.

Warehouses that are multi-cluster can have nodes of different sizes.

B.

Warehouses can be started and stopped at any time.

C.

Warehouses can be resized at any time, even while running.

D.

Warehouses are billed on a per-minute usage basis.

E.

Warehouses can only be used for querying and cannot be used for data loading.

Full Access
Question # 140

Who can activate and enforce a network policy for all users in a Snowflake account? (Select TWO).

A.

A user with an USERADMIN or higher role

B.

A user with a SECURITYADMIN or higher role

C.

A role that has been granted the ATTACH POLICY privilege

D.

A role that has the NETWORK_POLlCY account parameter set

E.

A role that has the ownership of the network policy

Full Access
Question # 141

Which ACCOUNT_USAGE schema database role provides visibility into policy-related information?

A.

USAGE_VIEWER

B.

GOVERNANCE_VIEWER

C.

OBJECT_VIEWER

D.

SECURITY_VIEWER

Full Access
Question # 142

Which Snowflake table objects can be shared with other accounts? (Select TWO).

A.

Temporary tables

B.

Permanent tables

C.

Transient tables

D.

External tables

E.

User-Defined Table Functions (UDTFs)

Full Access
Question # 143

A user with which privileges can create or manage other users in a Snowflake account? (Select TWO).

A.

GRANT

B.

SELECT

C.

MODIFY

D.

OWNERSHIP

E.

CREATE USER

Full Access
Question # 144

While working with unstructured data, which file function generates a Snowflake-hosted file URL to a staged file using the stage name and relative file path as inputs?

A.

GET_PRESIGNED_URL

B.

GET_ABSOLUTE_PATH

C.

BUILD_STAGE_FILE_URL

D.

BUILD SCOPED FILE URL

Full Access
Question # 145

What is a characteristic of materialized views in Snowflake?

A.

Materialized views do not allow joins.

B.

Clones of materialized views can be created directly by the user.

C.

Multiple tables can be joined in the underlying query of a materialized view.

D.

Aggregate functions can be used as window functions in materialized views.

Full Access
Question # 146

What type of query will benefit from the query acceleration service?

A.

Queries without filters or aggregation

B.

Queries with large scans and selective filters

C.

Queries where the GROUP BY has high cardinality

D.

Queries of tables that have search optimization service enabled

Full Access
Question # 147

During periods of warehouse contention which parameter controls the maximum length of time a warehouse will hold a query for processing?

A.

STATEMENT_TIMEOUT__IN__SECONDS

B.

STATEMENT_QUEUED_TIMEOUT_IN_SECONDS

C.

MAX_CONCURRENCY__LEVEL

D.

QUERY_TIMEOUT_IN_SECONDS

Full Access
Question # 148

Query compilation occurs in which architecture layer of the Snowflake Cloud Data Platform?

A.

Compute layer

B.

Storage layer

C.

Cloud infrastructure layer

D.

Cloud services layer

Full Access
Question # 149

Which Snowflake function is maintained separately from the data and helps to support features such as Time Travel, Secure Data Sharing, and pruning?

A.

Column compression

B.

Data clustering

C.

Micro-partitioning

D.

Metadata management

Full Access
Question # 150

Which stage type can be altered and dropped?

A.

Database stage

B.

External stage

C.

Table stage

D.

User stage

Full Access
Question # 151

A company's security audit requires generating a report listing all Snowflake logins (e.g.. date and user) within the last 90 days. Which of the following statements will return the required information?

A.

SELECT LAST_SUCCESS_LOGIN, LOGIN_NAME

FROM ACCOUNT_USAGE.USERS;

B.

SELECT EVENT_TIMESTAMP, USER_NAME

FROM table(information_schema.login_history_by_user())

C.

SELECT EVENT_TIMESTAMP, USER_NAME

FROM ACCOUNT_USAGE.ACCESS_HISTORY;

D.

SELECT EVENT_TIMESTAMP, USER_NAME

FROM ACCOUNT_USAGE.LOGIN_HISTORY;

Full Access
Question # 152

Which data type can be used to store geospatial data in Snowflake?

A.

Variant

B.

Object

C.

Geometry

D.

Geography

Full Access
Question # 153

A developer is granted ownership of a table that has a masking policy. The developer's role is not able to see the masked data. Will the developer be able to modify the table to read the masked data?

A.

Yes, because a table owner has full control and can unset masking policies.

B.

Yes, because masking policies only apply to cloned tables.

C.

No, because masking policies must always reference specific access roles.

D.

No, because ownership of a table does not include the ability to change masking policies

Full Access
Question # 154

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?

A.

The primary cluster in the virtual warehouse

B.

The entire virtual warehouse

C.

The database in which the virtual warehouse resides

D.

The Queries currently being run on the virtual warehouse

Full Access
Question # 155

What is the MOST performant file format for loading data in Snowflake?

A.

CSV (Unzipped)

B.

Parquet

C.

CSV (Gzipped)

D.

ORC

Full Access
Question # 156

How long is Snowpipe data load history retained?

A.

As configured in the create pipe settings

B.

Until the pipe is dropped

C.

64 days

D.

14 days

Full Access
Question # 157

What is a limitation of a Materialized View?

A.

A Materialized View cannot support any aggregate functions

B.

A Materialized View can only reference up to two tables

C.

A Materialized View cannot be joined with other tables

D.

A Materialized View cannot be defined with a JOIN

Full Access
Question # 158

Which copy INTO command outputs the data into one file?

A.

SINGLE=TRUE

B.

MAX_FILE_NUMBER=1

C.

FILE_NUMBER=1

D.

MULTIPLE=FAISE

Full Access
Question # 159

What is a best practice after creating a custom role?

A.

Create the custom role using the SYSADMIN role.

B.

Assign the custom role to the SYSADMIN role

C.

Assign the custom role to the PUBLIC role

D.

Add__CUSTOM to all custom role names

Full Access
Question # 160

Which Snowflake feature is used for both querying and restoring data?

A.

Cluster keys

B.

Time Travel

C.

Fail-safe

D.

Cloning

Full Access
Question # 161

What happens to the underlying table data when a CLUSTER BY clause is added to a Snowflake table?

A.

Data is hashed by the cluster key to facilitate fast searches for common data values

B.

Larger micro-partitions are created for common data values to reduce the number of partitions that must be scanned

C.

Smaller micro-partitions are created for common data values to allow for more parallelism

D.

Data may be colocated by the cluster key within the micro-partitions to improve pruning performance

Full Access
Question # 162

True or False: It is possible for a user to run a query against the query result cache without requiring an active Warehouse.

A.

True

B.

False

Full Access
Question # 163

How often are encryption keys automatically rotated by Snowflake?

A.

30 Days

B.

60 Days

C.

90 Days

D.

365 Days

Full Access
Question # 164

The fail-safe retention period is how many days?

A.

1 day

B.

7 days

C.

45 days

D.

90 days

Full Access
Question # 165

Where would a Snowflake user find information about query activity from 90 days ago?

A.

account__usage . query history view

B.

account__usage.query__history__archive View

C.

information__schema . cruery_history view

D.

information__schema - query history_by_ses s i on view

Full Access
Question # 166

Which of the following indicates that it may be appropriate to use a clustering key for a table? (Select TWO).

A.

The table contains a column that has very low cardinality

B.

DML statements that are being issued against the table are blocked

C.

The table has a small number of micro-partitions

D.

Queries on the table are running slower than expected

E.

The clustering depth for the table is large

Full Access
Question # 167

What SQL command would be used to view all roles that were granted to user.1?

A.

show grants to user USER1;

B.

show grants of user USER1;

C.

describe user USER1;

D.

show grants on user USER1;

Full Access
Question # 168

Which Snowflake technique can be used to improve the performance of a query?

A.

Clustering

B.

Indexing

C.

Fragmenting

D.

Using INDEX__HINTS

Full Access
Question # 169

Which of the following commands cannot be used within a reader account?

A.

CREATE SHARE

B.

ALTER WAREHOUSE

C.

DROP ROLE

D.

SHOW SCHEMAS

E.

DESCRBE TABLE

Full Access
Question # 170

In the query profiler view for a query, which components represent areas that can be used to help optimize query performance? (Select TWO)

A.

Bytes scanned

B.

Bytes sent over the network

C.

Number of partitions scanned

D.

Percentage scanned from cache

E.

External bytes scanned

Full Access
Question # 171

What happens when a virtual warehouse is resized?

A.

When increasing the size of an active warehouse the compute resource for all running and queued queries on the warehouse are affected

B.

When reducing the size of a warehouse the compute resources are removed only when they are no longer being used to execute any current statements.

C.

The warehouse will be suspended while the new compute resource is provisioned and will resume automatically once provisioning is complete.

D.

Users who are trying to use the warehouse will receive an error message until the resizing is complete

Full Access
Question # 172

Which command can be used to stage local files from which Snowflake interface?

A.

SnowSQL

B.

Snowflake classic web interface (Ul)

C.

Snowsight

D.

.NET driver

Full Access
Question # 173

What is a machine learning and data science partner within the Snowflake Partner Ecosystem?

A.

Informatica

B.

Power Bl

C.

Adobe

D.

Data Robot

Full Access
Question # 174

What Snowflake features allow virtual warehouses to handle high concurrency workloads? (Select TWO)

A.

The ability to scale up warehouses

B.

The use of warehouse auto scaling

C.

The ability to resize warehouses

D.

Use of multi-clustered warehouses

E.

The use of warehouse indexing

Full Access
Question # 175

A user is preparing to load data from an external stage

Which practice will provide the MOST efficient loading performance?

A.

Organize files into logical paths

B.

Store the files on the external stage to ensure caching is maintained

C.

Use pattern matching for regular expression execution

D.

Load the data in one large file

Full Access
Question # 176

Which of the following statements describe features of Snowflake data caching? (Choose two.)

A.

When a virtual warehouse is suspended, the data cache is saved on the remote storage layer.

B.

When the data cache is full, the least-recently used data will be cleared to make room.

C.

A user can only access their own queries from the query result cache.

D.

A user must set USE_METADATA_CACHE to TRUE to use the metadata cache in queries.

E.

The RESULT_SCAN table function can access and filter the contents of the query result cache.

Full Access
Question # 177

What is the minimum Snowflake edition required for row level security?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 178

A running virtual warehouse is suspended.

What is the MINIMUM amount of time that the warehouse will incur charges for when it is restarted?

A.

1 second

B.

60 seconds

C.

5 minutes

D.

60 minutes

Full Access
Question # 179

True or False: Snowpipe via REST API can only reference External Stages as source.

A.

True

B.

False

Full Access
Question # 180

Which SQL commands, when committed, will consume a stream and advance the stream offset? (Choose two.)

A.

UPDATE TABLE FROM STREAM

B.

SELECT FROM STREAM

C.

INSERT INTO TABLE SELECT FROM STREAM

D.

ALTER TABLE AS SELECT FROM STREAM

E.

BEGIN COMMIT

Full Access
Question # 181

Which methods can be used to delete staged files from a Snowflake stage? (Choose two.)

A.

Use the DROP command after the load completes.

B.

Specify the TEMPORARY option when creating the file format.

C.

Specify the PURGE copy option in the COPY INTO

command.

D.

Use the REMOVE command after the load completes.

E.

Use the DELETE LOAD HISTORY command after the load completes.

Full Access
 command, which will automatically delete the files after they have been successfully loaded. Additionally, you can use the REMOVE command after the load completes to manually delete the files from the stage12.

References = DROP STAGE, REMOVE

Question # 182

Which of the following features are available with the Snowflake Enterprise edition? (Choose two.)

A.

Database replication and failover

B.

Automated index management

C.

Customer managed keys (Tri-secret secure)

D.

Extended time travel

E.

Native support for geospatial data

Full Access
Question # 183

Which file formats are supported for unloading data from Snowflake? (Choose two.)

A.

Avro

B.

JSON

C.

ORC

D.

XML

E.

Delimited (CSV, TSV, etc.)

Full Access
Question # 184

Where can a user find and review the failed logins of a specific user for the past 30 days?

A.

The USERS view in ACCOUNT_USAGE

B.

The LOGIN_HISTORY view in ACCOUNT_USAGE

C.

The ACCESS_HISTORY view in ACCOUNT_USAGE

D.

The SESSIONS view in ACCOUNT_USAGE

Full Access
Question # 185

Which of the following accurately describes shares?

A.

Tables, secure views, and secure UDFs can be shared

B.

Shares can be shared

C.

Data consumers can clone a new table from a share

D.

Access to a share cannot be revoked once granted

Full Access
Question # 186

When loading data into Snowflake, how should the data be organized?

A.

Into single files with 100-250 MB of compressed data per file

B.

Into single files with 1-100 MB of compressed data per file

C.

Into files of maximum size of 1 GB of compressed data per file

D.

Into files of maximum size of 4 GB of compressed data per file

Full Access
Question # 187

Files have been uploaded to a Snowflake internal stage. The files now need to be deleted.

Which SQL command should be used to delete the files?

A.

PURGE

B.

MODIFY

C.

REMOVE

D.

DELETE

Full Access
Question # 188

A user created a transient table and made several changes to it over the course of several days. Three days after the table was created, the user would like to go back to the first version of the table.

How can this be accomplished?

A.

Use Time Travel, as long as DATA_RETENTION_TIME_IN_DAYS was set to at least 3 days.

B.

The transient table version cannot be retrieved after 24 hours.

C.

Contact Snowflake Support to have the data retrieved from Fail-safe storage.

D.

Use the FAIL_SAFE parameter for Time Travel to retrieve the data from Fail-safe storage.

Full Access
Question # 189

Which of the following is a data tokenization integration partner?

A.

Protegrity

B.

Tableau

C.

DBeaver

D.

SAP

Full Access
Question # 190

Which services does the Snowflake Cloud Services layer manage? (Choose two.)

A.

Compute resources

B.

Query execution

C.

Authentication

D.

Data storage

E.

Metadata

Full Access
Question # 191

What is an advantage of using an explain plan instead of the query profiler to evaluate the performance of a query?

A.

The explain plan output is available graphically.

B.

An explain plan can be used to conduct performance analysis without executing a query.

C.

An explain plan will handle queries with temporary tables and the query profiler will not.

D.

An explain plan's output will display automatic data skew optimization information.

Full Access
Question # 192

Which of the following describes the Snowflake Cloud Services layer?

A.

Coordinates activities in the Snowflake account

B.

Executes queries submitted by the Snowflake account users

C.

Manages quotas on the Snowflake account storage

D.

Manages the virtual warehouse cache to speed up queries

Full Access
Question # 193

Which statement about billing applies to Snowflake credits?

A.

Credits are billed per-minute with a 60-minute minimum

B.

Credits are used to pay for cloud data storage usage

C.

Credits are consumed based on the number of credits billed for each hour that a warehouse runs

D.

Credits are consumed based on the warehouse size and the time the warehouse is running

Full Access
Question # 194

A user has unloaded data from Snowflake to a stage

Which SQL command should be used to validate which data was loaded into the stage?

A.

list @file__stage

B.

show @file__stage

C.

view @file__stage

D.

verify @file__stage

Full Access
Question # 195

What tasks can be completed using the copy command? (Select TWO)

A.

Columns can be aggregated

B.

Columns can be joined with an existing table

C.

Columns can be reordered

D.

Columns can be omitted

E.

Data can be loaded without the need to spin up a virtual warehouse

Full Access
Question # 196

A user needs to create a materialized view in the schema MYDB.MYSCHEMA.

Which statements will provide this access?

A.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO ROLE MYROLE;

B.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER USER1;

C.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER1;

D.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO MYROLE;

Full Access
Question # 197

What is a responsibility of Snowflake's virtual warehouses?

A.

Infrastructure management

B.

Metadata management

C.

Query execution

D.

Query parsing and optimization

E.

Management of the storage layer

Full Access
Question # 198

Which Snowflake objects track DML changes made to tables, like inserts, updates, and deletes?

A.

Pipes

B.

Streams

C.

Tasks

D.

Procedures

Full Access
Question # 199

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)

A.

Customer-managed encryption keys through Tri-Secret Secure

B.

Automatic encryption of all data

C.

Up to 90 days of data recovery through Time Travel

D.

Object-level access control

E.

Column-level security to apply data masking policies to tables and views

Full Access
Question # 200

A company strongly encourages all Snowflake users to self-enroll in Snowflake's default Multi-Factor Authentication (MFA) service to provide increased login security for users connecting to Snowflake.

Which application will the Snowflake users need to install on their devices in order to connect with MFA?

A.

Okta Verify

B.

Duo Mobile

C.

Microsoft Authenticator

D.

Google Authenticator

Full Access
Question # 201

What occurs when a pipe is recreated using the CREATE OR REPLACE PIPE command?

A.

The Pipe load history is reset to empty.

B.

The REFRESH command is executed.

C.

The stage will be purged.

D.

The destination table is truncated.

Full Access
Question # 202

What is the MINIMUM edition of Snowflake that is required to use a SCIM security integration?

A.

Business Critical Edition

B.

Standard Edition

C.

Virtual Private Snowflake (VPS)

D.

Enterprise Edition

Full Access
Question # 203

Which data types are supported by Snowflake when using semi-structured data? (Choose two.)

A.

VARIANT

B.

VARRAY

C.

STRUCT

D.

ARRAY

E.

QUEUE

Full Access
Question # 204

What types of data listings are available in the Snowflake Data Marketplace? (Choose two.)

A.

Reader

B.

Consumer

C.

Vendor

D.

Standard

E.

Personalized

Full Access
Question # 205

Which tasks are performed in the Snowflake Cloud Services layer? (Choose two.)

A.

Management of metadata

B.

Computing the data

C.

Maintaining Availability Zones

D.

Infrastructure security

E.

Parsing and optimizing queries

Full Access
Question # 206

What are best practice recommendations for using the ACCOUNTADMIN system-defined role in Snowflake? (Choose two.)

A.

Ensure all ACCOUNTADMIN roles use Multi-factor Authentication (MFA).

B.

All users granted ACCOUNTADMIN role must be owned by the ACCOUNTADMIN role.

C.

The ACCOUNTADMIN role must be granted to only one user.

D.

Assign the ACCOUNTADMIN role to at least two users, but as few as possible.

E.

All users granted ACCOUNTADMIN role must also be granted SECURITYADMIN role.

Full Access
Question # 207

Which Snowflake function will interpret an input string as a JSON document, and produce a VARIANT value?

A.

parse_json()

B.

json_extract_path_text()

C.

object_construct()

D.

flatten

Full Access