Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Snowflake > SnowPro Core Certification > COF-C02

COF-C02 SnowPro Core Certification Exam (COF-C02) Question and Answers

Question # 4

Which activities are included in the Cloud Services layer? {Select TWO).

A.

Data storage

B.

Dynamic data masking

C.

Partition scanning

D.

User authentication

E.

Infrastructure management

Full Access
Question # 5

Which Snowflake edition offers the highest level of security for organizations that have the strictest requirements?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

Full Access
Question # 6

What is it called when a customer managed key is combined with a Snowflake managed key to create a composite key for encryption?

A.

Hierarchical key model

B.

Client-side encryption

C.

Tri-secret secure encryption

D.

Key pair authentication

Full Access
Question # 7

Regardless of which notation is used, what are considerations for writing the column name and element names when traversing semi-structured data?

A.

The column name and element names are both case-sensitive.

B.

The column name and element names are both case-insensitive.

C.

The column name is case-sensitive but element names are case-insensitive.

D.

The column name is case-insensitive but element names are case-sensitive.

Full Access
Question # 8

Which role has the ability to create a share from a shared database by default?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 9

While clustering a table, columns with which data types can be used as clustering keys? (Select TWO).

A.

BINARY

B.

GEOGRAPHY

C.

GEOMETRY

D.

OBJECT

E.

VARIANT

Full Access
Question # 10

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

Full Access
Question # 11

Which Snowflake mechanism is used to limit the number of micro-partitions scanned by a query?

A.

Caching

B.

Cluster depth

C.

Query pruning

D.

Retrieval optimization

Full Access
Question # 12

What is the Fail-safe period for a transient table in the Snowflake Enterprise edition and higher?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 13

If a virtual warehouse runs for 61 seconds, shut down, and then restart and runs for 30 seconds, for how many seconds is it billed?

A.

60

B.

91

C.

120

D.

121

Full Access
Question # 14

Which data types optimally store semi-structured data? (Select TWO).

A.

ARRAY

B.

CHARACTER

C.

STRING

D.

VARCHAR

E.

VARIANT

Full Access
Question # 15

Which view can be used to determine if a table has frequent row updates or deletes?

A.

TABLES

B.

TABLE_STORAGE_METRICS

C.

STORAGE_DAILY_HISTORY

D.

STORAGE USAGE

Full Access
Question # 16

What is the default value in the Snowflake Web Interface (Ul) for auto suspending a Virtual Warehouse?

A.

1 minutes

B.

5 minutes

C.

10 minutes

D.

15 minutes

Full Access
Question # 17

How does Snowflake reorganize data when it is loaded? (Select TWO).

A.

Binary format

B.

Columnar format

C.

Compressed format

D.

Raw format

E.

Zipped format

Full Access
Question # 18

A user has semi-structured data to load into Snowflake but is not sure what types of operations will need to be performed on the data. Based on this situation, what type of column does Snowflake recommend be used?

A.

ARRAY

B.

OBJECT

C.

TEXT

D.

VARIANT

Full Access
Question # 19

Which Snowflake layer is associated with virtual warehouses?

A.

Cloud services

B.

Query processing

C.

Elastic memory

D.

Database storage

Full Access
Question # 20

What are the benefits of the replication feature in Snowflake? (Select TWO).

A.

Disaster recovery

B.

Time Travel

C.

Fail-safe

D.

Database failover and fallback

E.

Data security

Full Access
Question # 21

Which command removes a role from another role or a user in Snowflak?

A.

ALTER ROLE

B.

REVOKE ROLE

C.

USE ROLE

D.

USE SECONDARY ROLES

Full Access
Question # 22

What happens when a network policy includes values that appear in both the allowed and blocked IP address list?

A.

Those IP addresses are allowed access to the Snowflake account as Snowflake applies the allowed IP address list first.

B.

Those IP addresses are denied access lei the Snowflake account as Snowflake applies the blocked IP address list first.

C.

Snowflake issues an alert message and adds the duplicate IP address values lo both 'he allowed and blocked IP address lists.

D.

Snowflake issues an error message and adds the duplicate IP address values to both the allowed and blocked IP address list

Full Access
Question # 23

When using the ALLOW_CLI£NT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 24

Which SQL command can be used to verify the privileges that are granted to a role?

A.

SHOW GRANTS ON ROLE

B.

SHOW ROLES

C.

SHOW GRANTS TO ROLE

D.

SHOW GRANTS FOR ROLE

Full Access
Question # 25

What is the Fail-safe retention period for transient and temporary tables?

A.

0 days

B.

1 day

C.

7 days

D.

90 days

Full Access
Question # 26

Which privilege is needed for a SnowFlake user to see the definition of a secure view?

A.

OWNERSHIP

B.

MODIFY

C.

CREATE

D.

USAGE

Full Access
Question # 27

What are characteristics of reader accounts in Snowflake? (Select TWO).

A.

Reader account users cannot add new data to the account.

B.

Reader account users can share data to other reader accounts.

C.

A single reader account can consume data from multiple provider accounts.

D.

Data consumers are responsible for reader account setup and data usage costs.

E.

Reader accounts enable data consumers to access and query data shared by the provider.

Full Access
Question # 28

How does the Access_History view enhance overall data governance pertaining to read and write operations? (Select TWO).

A.

Shows how the accessed data was moved from the source lo the target objects

B.

Provides a unified picture of what data was accessed and when it was accessed

C.

Protects sensitive data from unauthorized access while allowing authorized users to access it at query runtime

D.

Identifies columns with personal information and tags them so masking policies can be applied to protect sensitive data

E.

Determines whether a given row in a table can be accessed by the user by filtering the data based on a given policy

Full Access
Question # 29

While running a query on a virtual warehouse in auto-scale mode, additional clusters are stated immediately if which setting is configured?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

What is the MINIMUM role required to set the value for the parameter ENABLE_ACCOUNT_DATABASE_REPLICATION?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 31

How does Snowflake handle the data retention period for a table if a stream has not been consumed?

A.

The data retention period is reduced to a minimum of 14 days.

B.

The data retention period is permanently extended for the table.

C.

The data retention period is temporarily extended to the stream's offset.

D.

The data retention period is not affected by the stream consumption.

Full Access
Question # 32

Authorization to execute CREATE statements comes only from which role?

A.

Primary role

B.

Secondary role

C.

Application role

D.

Database role

Full Access
Question # 33

Snowflake's access control framework combines which models for securing data? (Select TWO).

A.

Attribute-based Access Control (ABAC 1

B.

Discretionary Access Control (DAC)

C.

Access Control List (ACL)

D.

Role-based Access Control (RBAC)

E.

Rule-based Access Control (RuBAC)

Full Access
Question # 34

When snaring data in Snowflake. what privileges does a Provider need to grant along with a share? (Select TWO).

A.

USAGE on the specific tables in the database.

B.

USAGE on the specific tables in the database.

C.

MODIFY on 1Mb specific tables in the database.

D.

USAGE on the database and the schema containing the tables to share

E.

OPEBATE on the database and the schema containing the tables to share.

Full Access
Question # 35

Which system_defined Snowflake role has permission to rename an account and specify whether the original URL can be used to access the renamed account?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 36

A clustering key was defined on a table, but It is no longer needed. How can the key be removed?

A.

ALTER TABLE

PURGE CLUSTERING KEY

B.

ALTER TABLE

DELETE CLUSTERING KEY

C.

ALTER TABLE

DROP CLUSTERING KEY

D.

ALTER TABLE

REMOVE CLUSTERING KEY

Full Access
Question # 37

Which object type is granted permissions for reading a table?

A.

User

B.

Role

C.

Attribute

D.

Schema

Full Access
Question # 38

How should a Snowflake use' configure a virtual warehouse to be in Maximized mode''

A.

Set the WAREHOUSES_SIZE to 6XL.

B.

Set the STATEMENT_TIMEOUT_1M_SECOMES to 0.

C.

Set the MAX_CONCURRENCY_LEVEL to a value of 12 or large.

D.

Set the same value for both MIN_CLUSTER_COUNT and MAX_CLUSTER_COUNT.

Full Access
Question # 39

Which command will unload data from a table into an external stage?

A.

PUT

B.

INSERT

C.

COPY INTO

D.

GET

Full Access
Question # 40

A JSON document is stored in the source_colum of type VARIANT. The document has an array called elements. The array contains the name key that has a string value How can a Snowflake user extract the name from the first element?

A.

Source_column.element[1]:name

B.

Source_column.element[0]:name

C.

Source_column.element[1].name

D.

Source_column.element[0]:name

Full Access
Question # 41

Which Snowflake object contains all the information required to share a database?

A.

Private listing

B.

Secure view

C.

Sequence

D.

Share

Full Access
Question # 42

Which function can be used with the copy into statement to convent rows from a relational table to a single variant column, and to unload rows into a JSON file?

A.

FLATTEN

B.

OBJECT_AS

C.

OBJECT_CONSTRUCT

D.

TO VARIANT

Full Access
Question # 43

In the Data Exchange, who can get or request data from the listings? (Select TWO).

A.

Users with ACCOUNTADMIN role

B.

Users with sysadmin role

C.

Users with ORGADMIN role

D.

Users with import share privilege

E.

Users with manage grants privilege

Full Access
Question # 44

Which views are included in the data_sharing_usage schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 45

Who can create network policies within Snowflake? (Select TWO).

A.

SYSADMIN only

B.

ORCADMIN only

C.

SECURITYADMIN or higher roles

D.

A role with the CREATE NETWORK POLICY privilege

E.

A role with the CREATE SECURITY INTEGRATION privilege

Full Access
Question # 46

Which Snowflake objects can be restored using Time Travel? (Select VNO).

A.

Roles

B.

Users

C.

Databases

D.

Schemas

E.

Virtual warehouses

Full Access
Question # 47

Which roles can make grant decisions to objects within a managed access schema? (Select TWO)

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSTEMADMIN

D.

ORGADMIN

E.

USERADMIN

Full Access
Question # 48

A user needs to MINIMIZE the cost of large tables that are used to store transitory data. The data does not need to be protected against failures, because the data can be reconstructed outside of Snowflake.

What table type should be used?

A.

Permanent

B.

Transient

C.

Temporary

D.

Externa

Full Access
Question # 49

What causes objects in a data share to become unavailable to a consumer account?

A.

The DATA_RETENTI0N_TIME_IN_DAYS parameter in the consumer account is set to 0.

B.

The consumer account runs the GRANT IMPORTED PRIVILEGES command on the data share every 24 hours.

C.

The objects in the data share are being deleted and the grant pattern is not re-applied systematically.

D.

The consumer account acquires the data share through a private data exchange.

Full Access
Question # 50

Which statement describes Snowflake tables?

A.

Snowflake tables arc logical representation of underlying physical data.

B.

Snowflake tables are the physical instantiation of data loaded into Snowflake.

C.

Snowflake tables require that clustering keys be defined lo perform optimally.

D.

Snowflake tables are owned by a use.

Full Access
Question # 51

Which user preferences can be set for a user profile in Snowsight? (Select TWO).

A.

Multi-Factor Authentication (MFA)

B.

Default database

C.

Default schema

D.

Notification

E.

Username

Full Access
Question # 52

What is a non-configurable feature that provides historical data that Snowflake may recover during a 7-day period?

A.

Fail-safe

B.

Time Travel

C.

Cloning

D.

Account replication

Full Access
Question # 53

What action should be taken if a Snowflake user wants to share a newly created object in a database with consumers?

A.

Use the automatic sharing feature for seamless access.

B.

Drop the object and then re-add it to the database to trigger sharing.

C.

Recreate the object with a different name in the database before sharing.

D.

Use the grant privilege ... TO share command to grant the necessary privileges.

Full Access
Question # 54

What is the MINIMUM size of a table for which Snowflake recommends considering adding a clustering key?

A.

1 Kilobyte (KB)

B.

1 Megabyte (MB)

C.

1 Gigabyte (GB)

D.

1 Terabyte (TB)

Full Access
Question # 55

How does the search optimization service help Snowflake users improve query performance?

A.

It scans the micro-partitions based on the joins used in the queries and scans only join columns.

B.

II maintains a persistent data structure that keeps track of the values of the table's columns m each of its micro-partitions.

C.

It scans the local disk cache to avoid scans on the tables used in the Query.

D.

It keeps track of running queries and their results and saves those extra scans on the table.

Full Access
Question # 56

When unloading data with the COPY into command, what is the purpose of the PARTITION BY parameter option?

A.

To sort the contents of the output file by the specified expression.

B.

To delimit the records in the output file using the specified expression.

C.

To include a new column in the output using the specified window function expression.

D.

To split the output into multiple files, one for each distinct value of the specified expression.

Full Access
Question # 57

At what level is the MIN_DATA_RETENSION_TIME_IN_DAYS parameter set?

A.

Account

B.

Database

C.

Schema

D.

Table

Full Access
Question # 58

What Snowflake role must be granted for a user to create and manage accounts?

A.

ACCOUNTADMIN

B.

ORGADMIN

C.

SECURITYADMIN

D.

SYSADMIN

Full Access
Question # 59

What are value types that a VARIANT column can store? (Select TWO)

A.

STRUCT

B.

OBJECT

C.

BINARY

D.

ARRAY

E.

CLOB

Full Access
Question # 60

Which of the following Snowflake objects can be shared using a secure share? (Select TWO).

A.

Materialized views

B.

Sequences

C.

Procedures

D.

Tables

E.

Secure User Defined Functions (UDFs)

Full Access
Question # 61

What tasks can be completed using the copy command? (Select TWO)

A.

Columns can be aggregated

B.

Columns can be joined with an existing table

C.

Columns can be reordered

D.

Columns can be omitted

E.

Data can be loaded without the need to spin up a virtual warehouse

Full Access
Question # 62

A developer is granted ownership of a table that has a masking policy. The developer's role is not able to see the masked data. Will the developer be able to modify the table to read the masked data?

A.

Yes, because a table owner has full control and can unset masking policies.

B.

Yes, because masking policies only apply to cloned tables.

C.

No, because masking policies must always reference specific access roles.

D.

No, because ownership of a table does not include the ability to change masking policies

Full Access
Question # 63

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?

A.

The primary cluster in the virtual warehouse

B.

The entire virtual warehouse

C.

The database in which the virtual warehouse resides

D.

The Queries currently being run on the virtual warehouse

Full Access
Question # 64

How would you determine the size of the virtual warehouse used for a task?

A.

Root task may be executed concurrently (i.e. multiple instances), it is recommended to leave some margins in the execution window to avoid missing instances of execution

B.

Querying (select) the size of the stream content would help determine the warehouse size. For example, if querying large stream content, use a larger warehouse size

C.

If using the stored procedure to execute multiple SQL statements, it's best to test run the stored procedure separately to size the compute resource first

D.

Since task infrastructure is based on running the task body on schedule, it's recommended to configure the virtual warehouse for automatic concurrency handling using Multi-cluster warehouse (MCW) to match the task schedule

Full Access
Question # 65

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)

A.

Customer-managed encryption keys through Tri-Secret Secure

B.

Automatic encryption of all data

C.

Up to 90 days of data recovery through Time Travel

D.

Object-level access control

E.

Column-level security to apply data masking policies to tables and views

Full Access
Question # 66

What is the purpose of an External Function?

A.

To call code that executes outside of Snowflake

B.

To run a function in another Snowflake database

C.

To share data in Snowflake with external parties

D.

To ingest data from on-premises data sources

Full Access
Question # 67

What is the default File Format used in the COPY command if one is not specified?

A.

CSV

B.

JSON

C.

Parquet

D.

XML

Full Access
Question # 68

What is a machine learning and data science partner within the Snowflake Partner Ecosystem?

A.

Informatica

B.

Power Bl

C.

Adobe

D.

Data Robot

Full Access
Question # 69

What is the recommended file sizing for data loading using Snowpipe?

A.

A compressed file size greater than 100 MB, and up to 250 MB

B.

A compressed file size greater than 100 GB, and up to 250 GB

C.

A compressed file size greater than 10 MB, and up to 100 MB

D.

A compressed file size greater than 1 GB, and up to 2 GB

Full Access
Question # 70

Which of the following are benefits of micro-partitioning? (Select TWO)

A.

Micro-partitions cannot overlap in their range of values

B.

Micro-partitions are immutable objects that support the use of Time Travel.

C.

Micro-partitions can reduce the amount of I/O from object storage to virtual warehouses

D.

Rows are automatically stored in sorted order within micro-partitions

E.

Micro-partitions can be defined on a schema-by-schema basis

Full Access
Question # 71

What SQL command would be used to view all roles that were granted to user.1?

A.

show grants to user USER1;

B.

show grants of user USER1;

C.

describe user USER1;

D.

show grants on user USER1;

Full Access
Question # 72

Which command is used to unload data from a Snowflake table into a file in a stage?

A.

COPY INTO

B.

GET

C.

WRITE

D.

EXTRACT INTO

Full Access
Question # 73

Which services does the Snowflake Cloud Services layer manage? (Select TWO).

A.

Compute resources

B.

Query execution

C.

Authentication

D.

Data storage

E.

Metadata

Full Access
Question # 74

Which command can be used to stage local files from which Snowflake interface?

A.

SnowSQL

B.

Snowflake classic web interface (Ul)

C.

Snowsight

D.

.NET driver

Full Access
Question # 75

Which of the following conditions must be met in order to return results from the results cache? (Select TWO).

A.

The user has the appropriate privileges on the objects associated with the query

B.

Micro-partitions have been reclustered since the query was last run

C.

The new query is run using the same virtual warehouse as the previous query

D.

The query includes a User Defined Function (UDF)

E.

The query has been run within 24 hours of the previously-run query

Full Access
Question # 76

Which of the following can be executed/called with Snowpipe?

A.

A User Defined Function (UDF)

B.

A stored procedure

C.

A single copy_into statement

D.

A single insert__into statement

Full Access
 statement within a pipe object to load data from files as soon as they are available in a stage. Snowpipe does not execute UDFs, stored procedures, or insert statements. References: Snowpipe | Snowflake Documentation

Question # 77

When reviewing a query profile, what is a symptom that a query is too large to fit into the memory?

A.

A single join node uses more than 50% of the query time

B.

Partitions scanned is equal to partitions total

C.

An AggregateOperacor node is present

D.

The query is spilling to remote storage

Full Access
Question # 78

Which account__usage views are used to evaluate the details of dynamic data masking? (Select TWO)

A.

ROLES

B.

POLICY_REFERENCES

C.

QUERY_HISTORY

D.

RESOURCE_MONIT ORS

E.

ACCESS_HISTORY

Full Access
Question # 79

True or False: A Virtual Warehouse can be resized while suspended.

A.

True

B.

False

Full Access
Question # 80

Which command can be used to load data into an internal stage?

A.

LOAD

B.

copy

C.

GET

D.

PUT

Full Access
Question # 81

Which of the following commands cannot be used within a reader account?

A.

CREATE SHARE

B.

ALTER WAREHOUSE

C.

DROP ROLE

D.

SHOW SCHEMAS

E.

DESCRBE TABLE

Full Access
Question # 82

What happens when a virtual warehouse is resized?

A.

When increasing the size of an active warehouse the compute resource for all running and queued queries on the warehouse are affected

B.

When reducing the size of a warehouse the compute resources are removed only when they are no longer being used to execute any current statements.

C.

The warehouse will be suspended while the new compute resource is provisioned and will resume automatically once provisioning is complete.

D.

Users who are trying to use the warehouse will receive an error message until the resizing is complete

Full Access
Question # 83

When unloading to a stage, which of the following is a recommended practice or approach?

A.

Set SINGLE: = true for larger files

B.

Use OBJECT_CONSTRUCT ( * ) when using Parquet

C.

Avoid the use of the CAST function

D.

Define an individual file format

Full Access
Question # 84

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

A.

SCIM

B.

Federated authentication

C.

TLS 1.2

D.

Key-pair authentication

E.

OAuth

F.

OCSP authentication

Full Access
Question # 85

Which of the following Snowflake features provide continuous data protection automatically? (Select TWO).

A.

Internal stages

B.

Incremental backups

C.

Time Travel

D.

Zero-copy clones

E.

Fail-safe

Full Access
Question # 86

True or False: Loading data into Snowflake requires that source data files be no larger than 16MB.

A.

True

B.

False

Full Access
Question # 87

What is a limitation of a Materialized View?

A.

A Materialized View cannot support any aggregate functions

B.

A Materialized View can only reference up to two tables

C.

A Materialized View cannot be joined with other tables

D.

A Materialized View cannot be defined with a JOIN

Full Access
Question # 88

Will data cached in a warehouse be lost when the warehouse is resized?

A.

Possibly, if the warehouse is resized to a smaller size and the cache no longer fits.

B.

Yes. because the compute resource is replaced in its entirety with a new compute resource.

C.

No. because the size of the cache is independent from the warehouse size

D.

Yes. became the new compute resource will no longer have access to the cache encryption key

Full Access
Question # 89

How long does Snowflake retain information in the ACCESS HISTORY view?

A.

7 days

B.

14 days

C.

28 days

D.

365 days

Full Access
Question # 90

Which privilege must be granted to a share to allow secure views the ability to reference data in multiple databases?

A.

CREATE_SHARE on the account

B.

SHARE on databases and schemas

C.

SELECT on tables used by the secure view

D.

REFERENCE_USAGE on databases

Full Access
Question # 91

Query parsing and compilation occurs in which architecture layer of the Snowflake Cloud Data Platform?

A.

Cloud services layer

B.

Compute layer

C.

Storage layer

D.

Cloud agnostic layer

Full Access
Question # 92

Which file format will keep floating-point numbers from being truncated when data is unloaded?

A.

CSV

B.

JSON

C.

ORC

D.

Parquet

Full Access
Question # 93

Which of the following is the Snowflake Account_Usage.Metering_History view used for?

A.

Gathering the hourly credit usage for an account

B.

Compiling an account's average cloud services cost over the previous month

C.

Summarizing the throughput of Snowpipe costs for an account

D.

Calculating the funds left on an account's contract

Full Access
Question # 94

What is used to diagnose and troubleshoot network connections to Snowflake?

A.

SnowCD

B.

Snowpark

C.

Snowsight

D.

SnowSQL

Full Access
Question # 95

When unloading data to an external stage, what is the MAXIMUM file size supported?

A.

1 GB

B.

5 GB

C.

10 GB

D.

16 GB

Full Access
Question # 96

What is cached during a query on a virtual warehouse?

A.

All columns in a micro-partition

B.

Any columns accessed during the query

C.

The columns in the result set of the query

D.

All rows accessed during the query

Full Access
Question # 97

What are advantages clones have over tables created with CREATE TABLE AS SELECT statement? (Choose two.)

A.

The clone always stays in sync with the original table.

B.

The clone has better query performance.

C.

The clone is created almost instantly.

D.

The clone will have time travel history from the original table.

E.

The clone saves space by not duplicating storage.

Full Access
Question # 98

Which of the following describes the Snowflake Cloud Services layer?

A.

Coordinates activities in the Snowflake account

B.

Executes queries submitted by the Snowflake account users

C.

Manages quotas on the Snowflake account storage

D.

Manages the virtual warehouse cache to speed up queries

Full Access
Question # 99

If file format options are specified in multiple locations, the load operation selects which option FIRST to apply in order of precedence?

A.

Table definition

B.

Stage definition

C.

Session level

D.

COPY INTO TABLE statement

Full Access
Question # 100

Which data type can store more than one type of data structure?

A.

JSON

B.

BINARY

C.

VARCHAR

D.

VARIANT

Full Access
Question # 101

Which REST API can be used with unstructured data?

A.

inscrtFilcs

B.

insertReport

C.

GET /api/tiles/

D.

loadHistoryScan

Full Access
Question # 102

How can a Snowflake user optimize query performance in Snowflake? (Select TWO).

A.

Create a view.

B.

Cluster a table.

C.

Enable the search optimization service.

D.

Enable Time Travel.

E.

Index a table.

Full Access
Question # 103

A company needs to read multiple terabytes of data for an initial load as part of a Snowflake migration. The company can control the number and size of CSV extract files.

How does Snowflake recommend maximizing the load performance?

A.

Use auto-ingest Snowpipes to load large files in a serverless model.

B.

Produce the largest files possible, reducing the overall number of files to process.

C.

Produce a larger number of smaller files and process the ingestion with size Small virtual warehouses.

D.

Use an external tool to issue batched row-by-row inserts within BEGIN TRANSACTION and COMMIT commands.

Full Access
Question # 104

Which Snowflake object can be accessed in he FROM clause of a query, returning a set of rows having one or more columns?

A.

A User-Defined Table Function (UDTF)

B.

A Scalar User Function (UDF)

C.

A stored procedure

D.

A task

Full Access
Question # 105

What column type does a Kafka connector store formatted information in a single column?

A.

ARRAY

B.

OBJECT

C.

VARCHAR

D.

VARIANT

Full Access
Question # 106

Which parameter can be used to instruct a COPY command to verify data files instead of loading them into a specified table?

A.

STRIP_NULL_VALUES

B.

SKIP_BYTE_ORDER_MARK

C.

REPLACE_INVALID_CHARACTERS

D.

VALIDATION_MODE

Full Access
Question # 107

Which features make up Snowflake's column level security? (Select TWO).

A.

Continuous Data Protection (CDP)

B.

Dynamic Data Masking

C.

External Tokenization

D.

Key pair authentication

E.

Row access policies

Full Access
Question # 108

Which Snowflake URL type is used by directory tables?

A.

File

B.

Pre-signed

C.

Scoped

D.

Virtual-hosted style

Full Access
Question # 109

Which Snowflake feature will allow small volumes of data to continuously load into Snowflake and will incrementally make the data available for analysis?

A.

COPY INTO

B.

CREATE PIPE

C.

INSERT INTO

D.

TABLE STREAM

Full Access
Question # 110

What can a Snowflake user do in the Activity section in Snowsight?

A.

Create dashboards.

B.

Write and run SQL queries.

C.

Explore databases and objects.

D.

Explore executed query performance.

Full Access
Question # 111

Which operations are handled in the Cloud Services layer of Snowflake? (Select TWO).

A.

Security

B.

Data storage

C.

Data visualization

D.

Query computation

E.

Metadata management

Full Access
Question # 112

Which Snowflake tool would be BEST to troubleshoot network connectivity?

A.

SnowCLI

B.

SnowUI

C.

SnowSQL

D.

SnowCD

Full Access
Question # 113

Which objects together comprise a namespace in Snowflake? (Select TWO).

A.

Account

B.

Database

C.

Schema

D.

Table

E.

Virtual warehouse

Full Access
Question # 114

Network policies can be applied to which of the following Snowflake objects? (Choose two.)

A.

Roles

B.

Databases

C.

Warehouses

D.

Users

E.

Accounts

Full Access
Question # 115

Which task privilege does a Snowflake role need in order to suspend or resume a task?

A.

USAGE

B.

OPERATE

C.

MONITOR

D.

OWNERSHIP

Full Access
Question # 116

What is the MAXIMUM Time Travel retention period for a transient table?

A.

O days

B.

1 day

C.

7 days

D.

90 days

Full Access
Question # 117

Which Snowflake object helps evaluate virtual warehouse performance impacted by query queuing?

A.

Resource monitor

B.

Account_usage. query_history

C.

Information_schema.warehouse_load_history

D.

Information schema.warehouse metering history

Full Access
Question # 118

Data storage for individual tables can be monitored using which commands and/or objects? (Choose two.)

A.

SHOW STORAGE BY TABLE;

B.

SHOW TABLES;

C.

Information Schema -> TABLE_HISTORY

D.

Information Schema -> TABLE_FUNCTION

E.

Information Schema -> TABLE_STORAGE_METRICS

Full Access
Question # 119

A materialized view should be created when which of the following occurs? (Choose two.)

A.

There is minimal cost associated with running the query.

B.

The query consumes many compute resources every time it runs.

C.

The base table gets updated frequently.

D.

The query is highly optimized and does not consume many compute resources.

E.

The results of the query do not change often and are used frequently.

Full Access
Question # 120

Which services does the Snowflake Cloud Services layer manage? (Choose two.)

A.

Compute resources

B.

Query execution

C.

Authentication

D.

Data storage

E.

Metadata

Full Access
Question # 121

What occurs when a pipe is recreated using the CREATE OR REPLACE PIPE command?

A.

The Pipe load history is reset to empty.

B.

The REFRESH command is executed.

C.

The stage will be purged.

D.

The destination table is truncated.

Full Access
Question # 122

What are the responsibilities of Snowflake's Cloud Service layer? (Choose three.)

A.

Authentication

B.

Resource management

C.

Virtual warehouse caching

D.

Query parsing and optimization

E.

Query execution

F.

Physical storage of micro-partitions

Full Access
Question # 123

What is the minimum Snowflake edition required for row level security?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 124

Which data types are supported by Snowflake when using semi-structured data? (Choose two.)

A.

VARIANT

B.

VARRAY

C.

STRUCT

D.

ARRAY

E.

QUEUE

Full Access
Question # 125

Which Snowflake layer is always leveraged when accessing a query from the result cache?

A.

Metadata

B.

Data Storage

C.

Compute

D.

Cloud Services

Full Access
Question # 126

A user is preparing to load data from an external stage

Which practice will provide the MOST efficient loading performance?

A.

Organize files into logical paths

B.

Store the files on the external stage to ensure caching is maintained

C.

Use pattern matching for regular expression execution

D.

Load the data in one large file

Full Access
Question # 127

A virtual warehouse is created using the following command:

Create warehouse my_WH with

warehouse_size = MEDIUM

min_cluster_count = 1

max_cluster_count = 1

auto_suspend = 60

auto_resume = true;

The image below is a graphical representation of the warehouse utilization across two days.

What action should be taken to address this situation?

A.

Increase the warehouse size from Medium to 2XL.

B.

Increase the value for the parameter MAX_CONCURRENCY_LEVEL.

C.

Configure the warehouse to a multi-cluster warehouse.

D.

Lower the value of the parameter STATEMENT_QUEUED_TIMEOUT_IN_SECONDS.

Full Access
Question # 128

Which Snowflake architectural layer is responsible for a query execution plan?

A.

Compute

B.

Data storage

C.

Cloud services

D.

Cloud provider

Full Access
Question # 129

Which of the following accurately describes shares?

A.

Tables, secure views, and secure UDFs can be shared

B.

Shares can be shared

C.

Data consumers can clone a new table from a share

D.

Access to a share cannot be revoked once granted

Full Access
Question # 130

Which SQL commands, when committed, will consume a stream and advance the stream offset? (Choose two.)

A.

UPDATE TABLE FROM STREAM

B.

SELECT FROM STREAM

C.

INSERT INTO TABLE SELECT FROM STREAM

D.

ALTER TABLE AS SELECT FROM STREAM

E.

BEGIN COMMIT

Full Access
Question # 131

Which of the following objects can be directly restored using the UNDROP command? (Choose two.)

A.

Schema

B.

View

C.

Internal stage

D.

Table

E.

User

F.

Role

Full Access
Question # 132

What do the terms scale up and scale out refer to in Snowflake? (Choose two.)

A.

Scaling out adds clusters of the same size to a virtual warehouse to handle more concurrent queries.

B.

Scaling out adds clusters of varying sizes to a virtual warehouse.

C.

Scaling out adds additional database servers to an existing running cluster to handle more concurrent queries.

D.

Snowflake recommends using both scaling up and scaling out to handle more concurrent queries.

E.

Scaling up resizes a virtual warehouse so it can handle more complex workloads.

F.

Scaling up adds additional database servers to an existing running cluster to handle larger workloads.

Full Access
Question # 133

What is the following SQL command used for?

Select * from table(validate(t1, job_id => '_last'));

A.

To validate external table files in table t1 across all sessions

B.

To validate task SQL statements against table t1 in the last 14 days

C.

To validate a file for errors before it gets executed using a COPY command

D.

To return errors from the last executed COPY command into table t1 in the current session

Full Access
Question # 134

What is the minimum Snowflake edition that has column-level security enabled?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake

Full Access
Question # 135

By default, which Snowflake role is required to create a share?

A.

ORGADMIN

B.

SECURITYADMIN

C.

SHAREADMIN

D.

ACCOUNTADMIN

Full Access
Question # 136

Which of the following objects are contained within a schema? (Choose two.)

A.

Role

B.

Stream

C.

Warehouse

D.

External table

E.

User

F.

Share

Full Access
Question # 137

What is the MINIMUM edition of Snowflake that is required to use a SCIM security integration?

A.

Business Critical Edition

B.

Standard Edition

C.

Virtual Private Snowflake (VPS)

D.

Enterprise Edition

Full Access
Question # 138

Which of the following are best practices for loading data into Snowflake? (Choose three.)

A.

Aim to produce data files that are between 100 MB and 250 MB in size, compressed.

B.

Load data from files in a cloud storage service in a different region or cloud platform from the service or region containing the Snowflake account, to save on cost.

C.

Enclose fields that contain delimiter characters in single or double quotes.

D.

Split large files into a greater number of smaller files to distribute the load among the compute resources in an active warehouse.

E.

When planning which warehouse(s) to use for data loading, start with the largest warehouse possible.

F.

Partition the staged data into large folders with random paths, allowing Snowflake to determine the best way to load each file.

Full Access
Question # 139

Which of the following significantly improves the performance of selective point lookup queries on a table?

A.

Clustering

B.

Materialized Views

C.

Zero-copy Cloning

D.

Search Optimization Service

Full Access
Question # 140

Where can a user find and review the failed logins of a specific user for the past 30 days?

A.

The USERS view in ACCOUNT_USAGE

B.

The LOGIN_HISTORY view in ACCOUNT_USAGE

C.

The ACCESS_HISTORY view in ACCOUNT_USAGE

D.

The SESSIONS view in ACCOUNT_USAGE

Full Access
Question # 141

Which of the following features are available with the Snowflake Enterprise edition? (Choose two.)

A.

Database replication and failover

B.

Automated index management

C.

Customer managed keys (Tri-secret secure)

D.

Extended time travel

E.

Native support for geospatial data

Full Access
Question # 142

Which of the following is a data tokenization integration partner?

A.

Protegrity

B.

Tableau

C.

DBeaver

D.

SAP

Full Access
Question # 143

When loading data into Snowflake, how should the data be organized?

A.

Into single files with 100-250 MB of compressed data per file

B.

Into single files with 1-100 MB of compressed data per file

C.

Into files of maximum size of 1 GB of compressed data per file

D.

Into files of maximum size of 4 GB of compressed data per file

Full Access
Question # 144

What is the maximum Time Travel retention period for a temporary Snowflake table?

A.

90 days

B.

1 day

C.

7 days

D.

45 days

Full Access
Question # 145

What is the maximum total Continuous Data Protection (CDP) charges incurred for a temporary table?

A.

30 days

B.

7 days

C.

48 hours

D.

24 hours

Full Access
Question # 146

A user has unloaded data from a Snowflake table to an external stage.

Which command can be used to verify if data has been uploaded to the external stage named my_stage?

A.

view @my_stage

B.

list @my_stage

C.

show @my_stage

D.

display @my_stage

Full Access
Question # 147

What are common issues found by using the Query Profile? (Choose two.)

A.

Identifying queries that will likely run very slowly before executing them

B.

Locating queries that consume a high amount of credits

C.

Identifying logical issues with the queries

D.

Identifying inefficient micro-partition pruning

E.

Data spilling to a local or remote disk

Full Access
Question # 148

Which command should be used to load data from a file, located in an external stage, into a table in Snowflake?

A.

INSERT

B.

PUT

C.

GET

D.

COPY

Full Access
Question # 149

Which of the following statements apply to Snowflake in terms of security? (Choose two.)

A.

Snowflake leverages a Role-Based Access Control (RBAC) model.

B.

Snowflake requires a user to configure an IAM user to connect to the database.

C.

All data in Snowflake is encrypted.

D.

Snowflake can run within a user's own Virtual Private Cloud (VPC).

E.

All data in Snowflake is compressed.

Full Access
Question # 150

How many days is load history for Snowpipe retained?

A.

1 day

B.

7 days

C.

14 days

D.

64 days

Full Access
Question # 151

Which object can be used with Secure Data Sharing?

A.

View

B.

Materialized view

C.

External table

D.

User-Defined Function (UDF)

Full Access
Question # 152

Which ACCOUNT_USAGE schema database role provides visibility into policy-related information?

A.

USAGE_VIEWER

B.

GOVERNANCE_VIEWER

C.

OBJECT_VIEWER

D.

SECURITY_VIEWER

Full Access
Question # 153

At what level is the MIN_DATA_RETENTION_TIME_IN_DAYS parameter set?

A.

Account

B.

Database

C.

Schema

D.

Table

Full Access
Question # 154

Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)

A.

INTEGER

B.

OBJECT

C.

VARIANT

D.

VARCHAR

E.

LIST

Full Access
Question # 155

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.

SELECT

B.

OWNERSHIP

C.

MONITOR

D.

MODIFY

E.

USAGE

Full Access
Question # 156

Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?

A.

OAuth

B.

Network policies

C.

Single Sign-On (SSO)

D.

Multi-Factor Authentication (MFA)

Full Access
Question # 157

When working with a managed access schema, who has the OWNERSHIP privilege of any tables added to the schema?

A.

The database owner

B.

The object owner

C.

The schema owner

D.

The Snowflake user's role

Full Access
Question # 158

Which VALIDATION_MODE value will return the errors across the files specified in a COPY command, including files that were partially loaded during an earlier load?

A.

RETURN_-1_R0WS

B.

RETURN_n_ROWS

C.

RETURN_ERRORS

D.

RETURN ALL ERRORS

Full Access
Question # 159

Which statistics are displayed in a Query Profile that indicate that intermediate results do not fit in memory? (Select TWO).

A.

Bytes scanned

B.

Partitions scanned

C.

Bytes spilled to local storage

D.

Bytes spilled to remote storage

E.

Percentage scanned from cache

Full Access
Question # 160

What objects in Snowflake are supported by Dynamic Data Masking? (Select TWO).'

A.

Views

B.

Materialized views

C.

Tables

D.

External tables

E.

Future grants

Full Access
Question # 161

Which Snowflake role can manage any object grant globally, including modifying and revoking grants?

A.

USERADMIN

B.

ORGADMIN

C.

SYSADMIN

D.

SECURITYADMIN

Full Access
Question # 162

Which operation can be performed on Snowflake external tables?

A.

INSERT

B.

JOIN

C.

RENAME

D.

ALTER

Full Access
Question # 163

Which privilege must be granted by one role to another role, and cannot be revoked?

A.

MONITOR

B.

OPERATE

C.

OWNERSHIP

D.

ALL

Full Access
Question # 164

When using the ALLOW CLIENT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 165

What type of query will benefit from the query acceleration service?

A.

Queries without filters or aggregation

B.

Queries with large scans and selective filters

C.

Queries where the GROUP BY has high cardinality

D.

Queries of tables that have search optimization service enabled

Full Access
Question # 166

When enabling access to unstructured data, which URL permits temporary access to a staged file without the need to grant privileges to the stage or to issue access tokens?

A.

File URL

B.

Scoped URL

C.

Relative URL

D.

Pre-Signed URL

Full Access
Question # 167

What happens when a Snowflake user changes the data retention period at the schema level?

A.

All child objects will retain data for the new retention period.

B.

All child objects that do not have an explicit retention period will automatically inherit the new retention period.

C.

All child objects with an explicit retention period will be overridden with the new retention period.

D.

All explicit child object retention periods will remain unchanged.

Full Access
Question # 168

What feature of Snowflake Continuous Data Protection can be used for maintenance of historical data?

A.

Access control

B.

Fail-safe

C.

Network policies

D.

Time Travel

Full Access
Question # 169

Which Snowflake view is used to support compliance auditing?

A.

ACCESS_HISTORY

B.

COPY_HISTORY

C.

QUERY_HISTORY

D.

ROW ACCESS POLICIES

Full Access
Question # 170

How can performance be optimized for a query that returns a small amount of data from a very large base table?

A.

Use clustering keys

B.

Create materialized views

C.

Use the search optimization service

D.

Use the query acceleration service

Full Access
Question # 171

What is the minimum Snowflake Edition that supports secure storage of Protected Health Information (PHI) data?

A.

Standard Edition

B.

Enterprise Edition

C.

Business Critical Edition

D.

Virtual Private Snowflake Edition

Full Access
Question # 172

What Snowflake feature provides a data hub for secure data collaboration, with a selected group of invited members?

A.

Data Replication

B.

Secure Data Sharing

C.

Data Exchange

D.

Snowflake Marketplace

Full Access
Question # 173

Which statements describe benefits of Snowflake's separation of compute and storage? (Select TWO).

A.

The separation allows independent scaling of computing resources.

B.

The separation ensures consistent data encryption across all virtual data warehouses.

C.

The separation supports automatic conversion of semi-structured data into structured data for advanced data analysis.

D.

Storage volume growth and compute usage growth can be tightly coupled.

E.

Compute can be scaled up or down without the requirement to add more storage.

Full Access
Question # 174

What does a Notify & Suspend action for a resource monitor do?

A.

Send an alert notification to all account users who have notifications enabled.

B.

Send an alert notification to all virtual warehouse users when thresholds over 100% have been met.

C.

Send a notification to all account administrators who have notifications enabled, and suspend all assigned warehouses after all statements being executed by the warehouses have completed.

D.

Send a notification to all account administrators who have notifications enabled, and suspend all assigned warehouses immediately, canceling any statements being executed by the warehouses.

Full Access
Question # 175

What is the purpose of a Query Profile?

A.

To profile how many times a particular query was executed and analyze its u^age statistics over time.

B.

To profile a particular query to understand the mechanics of the query, its behavior, and performance.

C.

To profile the user and/or executing role of a query and all privileges and policies applied on the objects within the query.

D.

To profile which queries are running in each warehouse and identify proper warehouse utilization and sizing for better performance and cost balancing.

Full Access
Question # 176

Which commands can only be executed using SnowSQL? (Select TWO).

A.

COPY INTO

B.

GET

C.

LIST

D.

PUT

E.

REMOVE

Full Access
Question # 177

A user wants to access files stored in a stage without authenticating into Snowflake. Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

Full Access
Question # 178

Which Snowflake database object can be used to track data changes made to table data?

A.

Tag

B.

Task

C.

Stream

D.

Stored procedure

Full Access
Question # 179

Which Snowflake function is maintained separately from the data and helps to support features such as Time Travel, Secure Data Sharing, and pruning?

A.

Column compression

B.

Data clustering

C.

Micro-partitioning

D.

Metadata management

Full Access
Question # 180

A tag object has been assigned to a table (TABLE_A) in a schema within a Snowflake database.

Which CREATE object statement will automatically assign the TABLE_A tag to a target object?

A.

CREATE TABLE LIKE TABLE_A;

B.

CREATE VIEW AS SELECT * FROM TABLE_A;

C.

CREATE TABLE AS SELECT * FROM TABLE_A;

D.

CREATE MATERIALIZED VIEW AS SELECT * FROM TABLE A;

Full Access
Question # 181

How should clustering be used to optimize the performance of queries that run on a very large table?

A.

Manually re-cluster the table regularly.

B.

Choose one high cardinality column as the clustering key.

C.

Use the column that is most-frequently used in query select clauses as the clustering key.

D.

Assess the average table depth to identify how clustering is impacting the query.

Full Access