11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

COF-C02 Exam Dumps - SnowPro Core Certification Exam

Question # 4

What does Snowflake's search optimization service support?

A.

External tables

B.

Materialized views

C.

Tables and views that are not protected by row access policies

D.

Casts on table columns (except for fixed-point numbers cast to strings)

Full Access
Question # 5

Which task privilege does a Snowflake role need in order to suspend or resume a task?

A.

USAGE

B.

OPERATE

C.

MONITOR

D.

OWNERSHIP

Full Access
Question # 6

Which of the following describes the Snowflake Cloud Services layer?

A.

Coordinates activities in the Snowflake account

B.

Executes queries submitted by the Snowflake account users

C.

Manages quotas on the Snowflake account storage

D.

Manages the virtual warehouse cache to speed up queries

Full Access
Question # 7

Which clients does Snowflake support Multi-Factor Authentication (MFA) token caching for? (Select TWO).

A.

GO driver

B.

Node.js driver

C.

ODBC driver

D.

Python connector

E.

Spark connector

Full Access
Question # 8

What happens when a Snowflake user changes the data retention period at the schema level?

A.

All child objects will retain data for the new retention period.

B.

All child objects that do not have an explicit retention period will automatically inherit the new retention period.

C.

All child objects with an explicit retention period will be overridden with the new retention period.

D.

All explicit child object retention periods will remain unchanged.

Full Access
Question # 9

How can a Snowflake user access a JSON object, given the following table? (Select TWO).

A.

src:salesperson.name

B.

src:sa1esPerson. name

C.

src:salesperson.Name

D.

SRC:salesperson.name

E.

SRC:salesperson.Name

Full Access
Question # 10

What does a Notify & Suspend action for a resource monitor do?

A.

Send an alert notification to all account users who have notifications enabled.

B.

Send an alert notification to all virtual warehouse users when thresholds over 100% have been met.

C.

Send a notification to all account administrators who have notifications enabled, and suspend all assigned warehouses after all statements being executed by the warehouses have completed.

D.

Send a notification to all account administrators who have notifications enabled, and suspend all assigned warehouses immediately, canceling any statements being executed by the warehouses.

Full Access
Question # 11

A company needs to read multiple terabytes of data for an initial load as part of a Snowflake migration. The company can control the number and size of CSV extract files.

How does Snowflake recommend maximizing the load performance?

A.

Use auto-ingest Snowpipes to load large files in a serverless model.

B.

Produce the largest files possible, reducing the overall number of files to process.

C.

Produce a larger number of smaller files and process the ingestion with size Small virtual warehouses.

D.

Use an external tool to issue batched row-by-row inserts within BEGIN TRANSACTION and COMMIT commands.

Full Access
Question # 12

What function can be used with the recursive argument to return a list of distinct key names in all nested elements in an object?

A.

FLATTEN

B.

GET_PATH

C.

CHECK_JSON

D.

PARSE JSON

Full Access
Question # 13

What objects in Snowflake are supported by Dynamic Data Masking? (Select TWO).'

A.

Views

B.

Materialized views

C.

Tables

D.

External tables

E.

Future grants

Full Access
Question # 14

Which object can be used with Secure Data Sharing?

A.

View

B.

Materialized view

C.

External table

D.

User-Defined Function (UDF)

Full Access
Question # 15

When using the ALLOW CLIENT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 16

Which solution improves the performance of point lookup queries that return a small number of rows from large tables using highly selective filters?

A.

Automatic clustering

B.

Materialized views

C.

Query acceleration service

D.

Search optimization service

Full Access
Question # 17

Which Snowflake view is used to support compliance auditing?

A.

ACCESS_HISTORY

B.

COPY_HISTORY

C.

QUERY_HISTORY

D.

ROW ACCESS POLICIES

Full Access
Question # 18

How can a Snowflake administrator determine which user has accessed a database object that contains sensitive information?

A.

Review the granted privileges to the database object.

B.

Review the row access policy for the database object.

C.

Query the ACCESS_HlSTORY view in the ACCOUNT_USAGE schema.

D.

Query the REPLICATION USAGE HISTORY view in the ORGANIZATION USAGE schema.

Full Access
Question # 19

Which data types can be used in Snowflake to store semi-structured data? (Select TWO)

A.

ARRAY

B.

BLOB

C.

CLOB

D.

JSON

E.

VARIANT

Full Access
Question # 20

Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)

A.

INTEGER

B.

OBJECT

C.

VARIANT

D.

VARCHAR

E.

LIST

Full Access
Question # 21

A user wants to access files stored in a stage without authenticating into Snowflake. Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

Full Access
Question # 22

What is the minimum Snowflake Edition that supports secure storage of Protected Health Information (PHI) data?

A.

Standard Edition

B.

Enterprise Edition

C.

Business Critical Edition

D.

Virtual Private Snowflake Edition

Full Access
Question # 23

For which use cases is running a virtual warehouse required? (Select TWO).

A.

When creating a table

B.

When loading data into a table

C.

When unloading data from a table

D.

When executing a show command

E.

When executing a list command

Full Access
Question # 24

Which Snowflake table objects can be shared with other accounts? (Select TWO).

A.

Temporary tables

B.

Permanent tables

C.

Transient tables

D.

External tables

E.

User-Defined Table Functions (UDTFs)

Full Access
Question # 25

A permanent table and temporary table have the same name, TBL1, in a schema.

What will happen if a user executes select * from TBL1 ;?

A.

The temporary table will take precedence over the permanent table.

B.

The permanent table will take precedence over the temporary table.

C.

An error will say there cannot be two tables with the same name in a schema.

D.

The table that was created most recently will take precedence over the older table.

Full Access
Question # 26

What happens to the objects in a reader account when the DROP MANAGED ACCOUNT command is executed?

A.

The objects are dropped.

B.

The objects enter the Fail-safe period.

C.

The objects enter the Time Travel period.

D.

The objects are immediately moved to the provider account.

Full Access
Question # 27

How is unstructured data retrieved from data storage?

A.

SQL functions like the GET command can be used to copy the unstructured data to a location on the client.

B.

SQL functions can be used to create different types of URLs pointing to the unstructured data. These URLs can be used to download the data to a client.

C.

SQL functions can be used to retrieve the data from the query results cache. When the query results are output to a client, the unstructured data will be output to the client as files.

D.

SQL functions can call on different web extensions designed to display different types of files as a web page. The web extensions will allow the files to be downloaded to the client.

Full Access
Question # 28

What are key characteristics of virtual warehouses in Snowflake? (Select TWO).

A.

Warehouses that are multi-cluster can have nodes of different sizes.

B.

Warehouses can be started and stopped at any time.

C.

Warehouses can be resized at any time, even while running.

D.

Warehouses are billed on a per-minute usage basis.

E.

Warehouses can only be used for querying and cannot be used for data loading.

Full Access
Question # 29

Which Snowflake function is maintained separately from the data and helps to support features such as Time Travel, Secure Data Sharing, and pruning?

A.

Column compression

B.

Data clustering

C.

Micro-partitioning

D.

Metadata management

Full Access
Question # 30

What is the purpose of the STRIP NULL_VALUES file format option when loading semi-structured data files into Snowflake?

A.

It removes null values from all columns in the data.

B.

It converts null values to empty strings during loading.

C.

It skips rows with null values during the loading process.

D.

It removes object or array elements containing null values.

Full Access
Question # 31

What factors impact storage costs in Snowflake? (Select TWO).

A.

The account type

B.

The storage file format

C.

The cloud region used by the account

D.

The type of data being stored

E.

The cloud platform being used

Full Access
Question # 32

When enabling access to unstructured data, which URL permits temporary access to a staged file without the need to grant privileges to the stage or to issue access tokens?

A.

File URL

B.

Scoped URL

C.

Relative URL

D.

Pre-Signed URL

Full Access
Question # 33

Which Snowflake function will parse a JSON-null into a SQL-null?

A.

TO_CHAR

B.

TO_VARIANT

C.

TO_VARCHAR

D.

STRIP NULL VALUE

Full Access
Question # 34

What is the relationship between a Query Profile and a virtual warehouse?

A.

A Query Profile can help users right-size virtual warehouses.

B.

A Query Profile defines the hardware specifications of the virtual warehouse.

C.

A Query Profile can help determine the number of virtual warehouses available.

D.

A Query Profile automatically scales the virtual warehouse based on the query complexity.

Full Access
Question # 35

While working with unstructured data, which file function generates a Snowflake-hosted file URL to a staged file using the stage name and relative file path as inputs?

A.

GET_PRESIGNED_URL

B.

GET_ABSOLUTE_PATH

C.

BUILD_STAGE_FILE_URL

D.

BUILD SCOPED FILE URL

Full Access
Question # 36

Which command is used to start configuring Snowflake for Single Sign-On (SSO)?

A.

CREATE SESSION POLICY

B.

CREATE NETWORK RULE

C.

CREATE SECURITY INTEGRATION

D.

CREATE PASSWORD POLICY

Full Access
Question # 37

How can a dropped internal stage be restored?

A.

Enable Time Travel.

B.

Clone the dropped stage.

C.

Execute the UNDROP command.

D.

Recreate the dropped stage.

Full Access
Question # 38

Which views are included in the DATA SHARING USAGE schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 39

What is the primary purpose of a directory table in Snowflake?

A.

To store actual data from external stages

B.

To automatically expire file URLs for security

C.

To manage user privileges and access control

D.

To store file-level metadata about data files in a stage

Full Access
Question # 40

How can performance be optimized for a query that returns a small amount of data from a very large base table?

A.

Use clustering keys

B.

Create materialized views

C.

Use the search optimization service

D.

Use the query acceleration service

Full Access
Question # 41

What information is found within the Statistic output in the Query Profile Overview?

A.

Operator tree

B.

Table pruning

C.

Most expensive nodes

D.

Nodes by execution time

Full Access
Question # 42

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.

Bytes scanned

B.

Bytes written to result

C.

Partitions scanned

D.

Partitions total

E.

Percentage scanned from cache

Full Access
Question # 43

What tasks can an account administrator perform in the Data Exchange? (Select TWO).

A.

Add and remove members.

B.

Delete data categories.

C.

Approve and deny listing approval requests.

D.

Transfer listing ownership.

E.

Transfer ownership of a provider profile.

Full Access
Question # 44

Based on Snowflake recommendations, when creating a hierarchy of custom roles, the top-most custom role should be assigned to which role?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

USERADMIN

Full Access
Question # 45

What are characteristics of the ownership privilege when it is granted on a regular Snowflake schema? (Select TWO).

A.

It is automatically granted to the role that creates a database object within the schema.

B.

It allows a role to manage grants on the schema.

C.

It can be transferred from one role to another for a specific schema.

D.

It grants the ability to query data from the schema.

E.

It must be granted to a role in order to alter warehouse settings.

Full Access
Question # 46

How can the Query Profile be used to troubleshoot a problematic query?

A.

It will indicate if a virtual warehouse memory is too small to run the query

B.

It will indicate if a user lacks the privileges needed to run the query.

C.

It will indicate if a virtual warehouse is in auto-scale mode

D.

It will indicate if the user has enough Snowflake credits to run the query

Full Access
Question # 47

Which ACCOUNT_USAGE schema database role provides visibility into policy-related information?

A.

USAGE_VIEWER

B.

GOVERNANCE_VIEWER

C.

OBJECT_VIEWER

D.

SECURITY_VIEWER

Full Access
Question # 48

Which function returns the URL of a stage using the stage name as the input?

A.

BUILD_STAGE_FILE_URL

B.

BUILD_SCOPED_FILE_URL

C.

GET_PRESIGNED_URL

D.

GET STAGE LOCATION

Full Access
Question # 49

Which Snowflake object can be used to record DML changes made to a table?

A.

Snowpipe

B.

Stage

C.

Stream

D.

Task

Full Access
Question # 50

Which types of subqueries does Snowflake support? (Select TWO).

A.

Uncorrelated scalar subqueries in WHERE clauses

B.

Uncorrelated scalar subqueries in any place that a value expression can be used

C.

EXISTS, ANY / ALL, and IN subqueries in WHERE clauses: these subqueries can be uncorrelated only

D.

EXISTS, ANY / ALL, and IN subqueries in where clauses: these subqueries can be correlated only

E.

EXISTS, ANY /ALL, and IN subqueries in WHERE clauses: these subqueries can be correlated or uncorrelated

Full Access
Question # 51

When snaring data in Snowflake. what privileges does a Provider need to grant along with a share? (Select TWO).

A.

USAGE on the specific tables in the database.

B.

USAGE on the specific tables in the database.

C.

MODIFY on 1Mb specific tables in the database.

D.

USAGE on the database and the schema containing the tables to share

E.

OPEBATE on the database and the schema containing the tables to share.

Full Access
Question # 52

Use of which file function allows a user to share unstructured data from an internal stage with an external reporting tool that does not have access to Snowflake">

A.

BUILD_SCOPED_FILE_URL

B.

GET_PRESIGNED_URL

C.

BUILD_STAGE_FILE_URL

D.

GET_STAGE_LOCATION

Full Access
Question # 53

Who can create and manage reader accounts? (Select TWO).

A.

A user with ACCOUNTADMIN role

B.

A user with securityadmin role

C.

A user with SYSADMIN role

D.

A user with ORGADMIH role

E.

A user with CREATE ACCOUNT privilege

Full Access
Question # 54

Which governance feature is supported by all Snowflake editions?

A.

Object tags

B.

Masking policies

C.

Row access policies

D.

OBJECT_DEPENDENCIES View

Full Access
Question # 55

Which Snowflake table type is only visible to the user who creates it, can have the same name as permanent tables in the same schema, and is dropped at the end of the session?

A.

Temporary

B.

Local

C.

User

D.

Transient

Full Access
Question # 56

What command is used to export or unload data from Snowflake?

A.

PUT @mystage

B.

GET @mystage

C.

COPY INTO @mystage

D.

INSERT @mystage

Full Access
Question # 57

What does Snowflake recommend as a best practice for using secure views?

A.

Use sequence-gen era ted values

B.

Programmatically reveal the identifiers.

C.

Use secure views solely for query convenience.

D.

Do not expose the sequence-generated column(s)

Full Access
Question # 58

Which virtual warehouse consideration can help lower compute resource credit consumption?

A.

Setting up a multi-cluster virtual warehouse

B.

Resizing the virtual warehouse to a larger size

C.

Automating the virtual warehouse suspension and resumption settings

D.

Increasing the maximum cluster count parameter for a multi-cluster virtual warehouse

Full Access
Question # 59

Snowflake users can create a resource monitor at which levels? (Select TWO).

A.

User level

B.

Pipe level

C.

Account level

D.

Cloud services level

E.

Virtual warehouse level

Full Access
Question # 60

Given the statement template below, which database objects can be added to a share?(Select TWO).

GRANT ON To SHARE ;

A.

Secure functions

B.

Stored procedures

C.

Streams

D.

Tables

E.

Tasks

Full Access
Question # 61

What virtual warehouse configuration should be used when processing a large number of complex queries?

A.

Use the auto-resume feature.

B.

Run the warehouse in auto-scale mode.

C.

Increase the size of the warehouse.

D.

Increase the number of warehouse clusters.

Full Access
Question # 62

A user needs to MINIMIZE the cost of large tables that are used to store transitory data. The data does not need to be protected against failures, because the data can be reconstructed outside of Snowflake.

What table type should be used?

A.

Permanent

B.

Transient

C.

Temporary

D.

Externa

Full Access
Question # 63

What are the main differences between the account usage views and the information schema views? (Select TWO).

A.

No active warehouse to needed to query account usage views but one is needed to query information schema views.

B.

Account usage views do not contain data about tables but information schema views do.

C.

Account issue views contain dropped objects but information schema views do not.

D.

Data retention for account usage views is 1 year but is 7 days to 6 months for information schema views, depending on the view.

E.

Information schema views are read-only but account usage views are not.

Full Access
Question # 64

What action should be taken if a Snowflake user wants to share a newly created object in a database with consumers?

A.

Use the automatic sharing feature for seamless access.

B.

Drop the object and then re-add it to the database to trigger sharing.

C.

Recreate the object with a different name in the database before sharing.

D.

Use the grant privilege ... TO share command to grant the necessary privileges.

Full Access
Question # 65

What are potential impacts of storing non-native values like dates and timestamps in a variant column in Snowflake?

A.

Faster query performance and increased storage consumption

B.

Slower query performance and increased storage consumption

C.

Faster query performance and decreased storage consumption

D.

Slower query performance and decreased storage consumption

Full Access
Question # 66

Which security models are used in Snowflake to manage access control? (Select TWO).

A.

Discretionary Access Control (DAC)

B.

Identity Access Management (1AM)

C.

Mandatory Access Control (MAC)

D.

Role-Based Access Control (RBAC)

E.

Security Assertion Markup Language (SAML)

Full Access
Question # 67

Which system_defined, read-only view display information on column lineage that specifies how data flows from source to target in a SQL write operation?

A.

ACCESS_HISTORY

B.

LOAD_HOSTORY

C.

QUERY_HISTORY

D.

COPY_HISTORY

Full Access
Question # 68

A query containing a WHERE clause is running longer than expected. The Query Profile shows that all micro-partitions being scanned How should this query be optimized?

A.

Create a view on the table.

B.

Add a clustering key to the table

C.

Add a limit clause to the query.

D.

Add a Dynamic Data Masking policy to the table.

Full Access
Question # 69

Which command can be used to list all network policies available in an account?

A.

DESCRIBE SESSION POLICY

B.

DESCRIBE NETWORK POLICY

C.

SHOW SESSION POLICIES

D.

SHOW NETWORK POLICIES

Full Access
Question # 70

Which actions can be performed using a resource monitor in Snowflake? (Select TWO).

A.

Monitor the performance of individual queries in real-time

B.

Automatically allocate more storage space to a virtual warehouse

C.

Modify the queries being executed within a virtual warehouse.

D.

Suspend a virtual warehouse when its credit usage reaches a defined limit.

E.

Trigger a notification to account administrators when credit usage reaches a specified threshold

Full Access
Question # 71

What objects can be cloned within Snowflake? (Select TWO).

A.

Schemas

B.

Users

C.

External tables

D.

Internal named stages

E.

External named stages

Full Access
Question # 72

Which Snowflake table type persists until it is explicitly dropped. is available for all users with relevant privileges (across sessions). and has no Fail-safe period?

A.

External

B.

Permanent

C.

Temporary

D.

Transient

Full Access
Question # 73

Which Snowsight feature can be used to perform data manipulations and transformations using a programming language?

A.

SnowSQL

B.

Dashboards

C.

Python worksheets

D.

Provider Studio

Full Access
Question # 74

Which service or tool is a Command Line Interface (CLI) client used for connecting to Snowflake to execute SQL queries?

A.

Snowsight

B.

SnowCD

C.

Snowpark

D.

SnowSQL

Full Access
Question # 75

How does Snowflake handle the data retention period for a table if a stream has not been consumed?

A.

The data retention period is reduced to a minimum of 14 days.

B.

The data retention period is permanently extended for the table.

C.

The data retention period is temporarily extended to the stream's offset.

D.

The data retention period is not affected by the stream consumption.

Full Access
Question # 76

What does Snowflake recommend for a user assigned the ACCOUNTADMIN role?

A.

The ACCCUKTMKIN role should be set as tie user's default role.

B.

The user should use federated authentication instead of a password

C.

The user should be required to use Multi-Factor Authentication (MFA).

D.

There should be just one user with the ACCOUNTADMIN role in each Snowflake account.

Full Access
Question # 77

What happens to the privileges granted to Snowflake system-defined roles?

A.

The privileges cannot be revoked.

B.

The privileges can be revoked by an ACCOUNTADMIN.

C.

The privileges can be revoked by an orgadmin.

D.

The privileges can be revoked by any user-defined role with appropriate privileges.

Full Access
Question # 78

A clustering key was defined on a table, but It is no longer needed. How can the key be removed?

A.

ALTER TABLE

PURGE CLUSTERING KEY

B.

ALTER TABLE

DELETE CLUSTERING KEY

C.

ALTER TABLE

DROP CLUSTERING KEY

D.

ALTER TABLE

REMOVE CLUSTERING KEY

Full Access
Question # 79

Which privilege is needed for a SnowFlake user to see the definition of a secure view?

A.

OWNERSHIP

B.

MODIFY

C.

CREATE

D.

USAGE

Full Access
Question # 80

How does a Snowflake user extract the URL of a directory table on an external stage for further transformation?

A.

Use the SHOW STAGES command.

B.

Use the DESCRIBE STAGE command.

C.

Use the GET_ABSOLUTE_PATH function.

D.

Use the GET_STAGE_LOCATION function.

Full Access
Question # 81

What are characteristic of Snowsight worksheet? (Select TWO.)

A.

Worksheets can be grouped under folder, and a folder of folders.

B.

Each worksheet is a unique Snowflake session.

C.

Users are limited to running only one on a worksheet.

D.

The Snowflake session ends when a user switches worksheets.

E.

Users can import worksheets and share them with other users.

Full Access
Question # 82

The VALIDATE table function has which parameter as an input argument for a Snowflake user?

A.

Last_QUERY_ID

B.

CURRENT_STATEMENT

C.

UUID_STRING

D.

JOB_ID

Full Access
Question # 83

What criteria does Snowflake use to determine the current role when initiating a session? (Select TWO).

A.

If a role was specified as part of the connection and that role has been granted to the Snowflake user, the specified role becomes the current role.

B.

If no role was specified as part of the connection and a default role has been defined for the Snowflake user, that role becomes the current role.

C.

If no role was specified as part of the connection and a default role has not been set for the Snowflake user, the session will not be initiated and the log in will fail.

D.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, it will be ignored and the default role will become the current role.

E.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, the role is automatically granted and it becomes the current role.

Full Access
Question # 84

Which activities are included in the Cloud Services layer? {Select TWO).

A.

Data storage

B.

Dynamic data masking

C.

Partition scanning

D.

User authentication

E.

Infrastructure management

Full Access
Question # 85

What activities can a user with the ORGADMIN role perform? (Select TWO).

A.

Create an account for an organization.

B.

Edit the account data for an organization.

C.

Delete the account data for an organization.

D.

View usage information for all accounts in an organization.

E.

Select all the data in tables for all accounts in an organization.

Full Access
Question # 86

What does the TableScan operator represent in the Query Profile?

A.

The access to a single table

B.

The access to data stored in stage objects

C.

The list of values provided with the VALUES clause

D.

The records generated using the TABLE (GENERATOR (...)) construct

Full Access
Question # 87

How does Snowflake reorganize data when it is loaded? (Select TWO).

A.

Binary format

B.

Columnar format

C.

Compressed format

D.

Raw format

E.

Zipped format

Full Access
Question # 88

When floating-point number columns are unloaded to CSV or JSON files, Snowflake truncates the values to approximately what?

A.

(12,2)

B.

(10,4)

C.

(14,8)

D.

(15,9)

Full Access
Question # 89

When using the ALLOW_CLI£NT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 90

User1, who has the SYSADMIN role, executed a query on Snowsight. User2, who is in the same Snowflake account, wants to view the result set of the query executed by User1 using the Snowsight query history.

What will happen if User2 tries to access the query history?

A.

If User2 has the sysadmin role they will be able to see the results.

B.

If User2 has the securityadmin role they will be able to see the results.

C.

If User2 has the ACCOUNTADMIN role they will be able to see the results.

D.

User2 will be unable to view the result set of the query executed by User1.

Full Access
Question # 91

Which Snowflake data type is used to store JSON key value pairs?

A.

TEXT

B.

BINARY

C.

STRING

D.

VARIANT

Full Access
Question # 92

If a virtual warehouse runs for 61 seconds, shut down, and then restart and runs for 30 seconds, for how many seconds is it billed?

A.

60

B.

91

C.

120

D.

121

Full Access
Question # 93

What is the Fail-safe retention period for transient and temporary tables?

A.

0 days

B.

1 day

C.

7 days

D.

90 days

Full Access
Question # 94

There are two Snowflake accounts in the same cloud provider region: one is production and the other is non-production. How can data be easily transferred from the production account to the non-production account?

A.

Clone the data from the production account to the non-production account.

B.

Create a data share from the production account to the non-production account.

C.

Create a subscription in the production account and have it publish to the non-production account.

D.

Create a reader account using the production account and link the reader account to the non-production account.

Full Access
Question # 95

What happens when a network policy includes values that appear in both the allowed and blocked IP address list?

A.

Those IP addresses are allowed access to the Snowflake account as Snowflake applies the allowed IP address list first.

B.

Those IP addresses are denied access lei the Snowflake account as Snowflake applies the blocked IP address list first.

C.

Snowflake issues an alert message and adds the duplicate IP address values lo both 'he allowed and blocked IP address lists.

D.

Snowflake issues an error message and adds the duplicate IP address values to both the allowed and blocked IP address list

Full Access
Question # 96

What should be used when creating a CSV file format where the columns are wrapped by single quotes or double quotes?

A.

BINARY_FORMAT

B.

ESCAPE_UNENCLOSED_FIELD

C.

FIELD_OPTIONALLY_ENCLOSED_BY

D.

SKIP BYTE ORDER MARK

Full Access
Question # 97

Which function should be used to insert JSON format string data inot a VARIANT field?

A.

FLATTEN

B.

CHECK_JSON

C.

PARSE_JSON

D.

TO_VARIANT

Full Access
Question # 98

What is the default value in the Snowflake Web Interface (Ul) for auto suspending a Virtual Warehouse?

A.

1 minutes

B.

5 minutes

C.

10 minutes

D.

15 minutes

Full Access
Question # 99

What are the benefits of the replication feature in Snowflake? (Select TWO).

A.

Disaster recovery

B.

Time Travel

C.

Fail-safe

D.

Database failover and fallback

E.

Data security

Full Access
Question # 100

A user has semi-structured data to load into Snowflake but is not sure what types of operations will need to be performed on the data. Based on this situation, what type of column does Snowflake recommend be used?

A.

ARRAY

B.

OBJECT

C.

TEXT

D.

VARIANT

Full Access
Question # 101

What is the MAXIMUM number of clusters that can be provisioned with a multi-cluster virtual warehouse?

A.

1

B.

5

C.

10

D.

100

Full Access
Question # 102

Regardless of which notation is used, what are considerations for writing the column name and element names when traversing semi-structured data?

A.

The column name and element names are both case-sensitive.

B.

The column name and element names are both case-insensitive.

C.

The column name is case-sensitive but element names are case-insensitive.

D.

The column name is case-insensitive but element names are case-sensitive.

Full Access
Question # 103

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

Full Access
Question # 104

Which command can be used to list all the file formats for which a user has access privileges?

A.

LIST

B.

ALTER FILE FORMAT

C.

DESCRIBE FILE FORMAT

D.

SHOW FILE FORMATS

Full Access
Question # 105

What information does the Query Profile provide?

A.

Graphical representation of the data model

B.

Statistics for each component of the processing plan

C.

Detailed Information about I he database schema

D.

Real-time monitoring of the database operations

Full Access
Question # 106

Which command removes a role from another role or a user in Snowflak?

A.

ALTER ROLE

B.

REVOKE ROLE

C.

USE ROLE

D.

USE SECONDARY ROLES

Full Access
Question # 107

What is the Fail-safe period for a transient table in the Snowflake Enterprise edition and higher?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Full Access
Question # 108

While clustering a table, columns with which data types can be used as clustering keys? (Select TWO).

A.

BINARY

B.

GEOGRAPHY

C.

GEOMETRY

D.

OBJECT

E.

VARIANT

Full Access
Question # 109

Which data formats are supported by Snowflake when unloading semi-structured data? (Select TWO).

A.

Binary file in Avro

B.

Binary file in Parquet

C.

Comma-separated JSON

D.

Newline Delimited JSON

E.

Plain text file containing XML elements

Full Access
Question # 110

What is used to denote a pre-computed data set derived from a SELECT query specification and stored for later use?

A.

View

B.

Secure view

C.

Materialized view

D.

External table

Full Access
Question # 111

Which role has the ability to create a share from a shared database by default?

A.

ACCOUNTADMIN

B.

SECURITYADMIN

C.

SYSADMIN

D.

ORGADMIN

Full Access
Question # 112

Which command should be used to unload all the rows from a table into one or more files in a named stage?

A.

COPY INTO

B.

GET

C.

INSERT INTO

D.

PUT

Full Access
Question # 113

For Directory tables, what stage allows for automatic refreshing of metadata?

A.

User stage

B.

Table stage

C.

Named internal stage

D.

Named external stage

Full Access
Question # 114

What are characteristics of transient tables in Snowflake? (Select TWO).

A.

Transient tables have a Fail-safe period of 7 days.

B.

Transient tables can be cloned to permanent tables.

C.

Transient tables persist until they are explicitly dropped.

D.

Transient tables can be altered to make them permanent tables.

E.

Transient tables have Time Travel retention periods of 0 or 1 day.

Full Access
Question # 115

A user needs to create a materialized view in the schema MYDB.MYSCHEMA.

Which statements will provide this access?

A.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO ROLE MYROLE;

B.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER USER1;

C.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER1;

D.

GRANT ROLE MYROLE TO USER USER1;

CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO MYROLE;

Full Access
Question # 116

Which stage type can be altered and dropped?

A.

Database stage

B.

External stage

C.

Table stage

D.

User stage

Full Access
Question # 117

Which of the following commands cannot be used within a reader account?

A.

CREATE SHARE

B.

ALTER WAREHOUSE

C.

DROP ROLE

D.

SHOW SCHEMAS

E.

DESCRBE TABLE

Full Access
Question # 118

In the query profiler view for a query, which components represent areas that can be used to help optimize query performance? (Select TWO)

A.

Bytes scanned

B.

Bytes sent over the network

C.

Number of partitions scanned

D.

Percentage scanned from cache

E.

External bytes scanned

Full Access
Question # 119

A user has 10 files in a stage containing new customer data. The ingest operation completes with no errors, using the following command:

COPY INTO my__table FROM @my__stage;

The next day the user adds 10 files to the stage so that now the stage contains a mixture of new customer data and updates to the previous data. The user did not remove the 10 original files.

If the user runs the same copy into command what will happen?

A.

All data from all of the files on the stage will be appended to the table

B.

Only data about new customers from the new files will be appended to the table

C.

The operation will fail with the error uncertain files in stage.

D.

All data from only the newly-added files will be appended to the table.

Full Access
Question # 120

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)

A.

Customer-managed encryption keys through Tri-Secret Secure

B.

Automatic encryption of all data

C.

Up to 90 days of data recovery through Time Travel

D.

Object-level access control

E.

Column-level security to apply data masking policies to tables and views

Full Access
Question # 121

Which of the following conditions must be met in order to return results from the results cache? (Select TWO).

A.

The user has the appropriate privileges on the objects associated with the query

B.

Micro-partitions have been reclustered since the query was last run

C.

The new query is run using the same virtual warehouse as the previous query

D.

The query includes a User Defined Function (UDF)

E.

The query has been run within 24 hours of the previously-run query

Full Access
Question # 122

Which of the following Snowflake features provide continuous data protection automatically? (Select TWO).

A.

Internal stages

B.

Incremental backups

C.

Time Travel

D.

Zero-copy clones

E.

Fail-safe

Full Access
Question # 123

A user has an application that writes a new Tile to a cloud storage location every 5 minutes.

What would be the MOST efficient way to get the files into Snowflake?

A.

Create a task that runs a copy into operation from an external stage every 5 minutes

B.

Create a task that puts the files in an internal stage and automate the data loading wizard

C.

Create a task that runs a GET operation to intermittently check for new files

D.

Set up cloud provider notifications on the Tile location and use Snowpipe with auto-ingest

Full Access
Question # 124

True or False: Fail-safe can be disabled within a Snowflake account.

A.

True

B.

False

Full Access
Question # 125

Which command can be used to stage local files from which Snowflake interface?

A.

SnowSQL

B.

Snowflake classic web interface (Ul)

C.

Snowsight

D.

.NET driver

Full Access
Question # 126

Which data type can be used to store geospatial data in Snowflake?

A.

Variant

B.

Object

C.

Geometry

D.

Geography

Full Access
Question # 127

During periods of warehouse contention which parameter controls the maximum length of time a warehouse will hold a query for processing?

A.

STATEMENT_TIMEOUT__IN__SECONDS

B.

STATEMENT_QUEUED_TIMEOUT_IN_SECONDS

C.

MAX_CONCURRENCY__LEVEL

D.

QUERY_TIMEOUT_IN_SECONDS

Full Access
Question # 128

What feature can be used to reorganize a very large table on one or more columns?

A.

Micro-partitions

B.

Clustering keys

C.

Key partitions

D.

Clustered partitions

Full Access
Question # 129

What happens when a cloned table is replicated to a secondary database? (Select TWO)

A.

A read-only copy of the cloned tables is stored.

B.

The replication will not be successful.

C.

The physical data is replicated

D.

Additional costs for storage are charged to a secondary account

E.

Metadata pointers to cloned tables are replicated

Full Access
Question # 130

The Information Schema and Account Usage Share provide storage information for which of the following objects? (Choose three.)

A.

Users

B.

Tables

C.

Databases

D.

Internal Stages

Full Access
Question # 131

Which Snowflake technique can be used to improve the performance of a query?

A.

Clustering

B.

Indexing

C.

Fragmenting

D.

Using INDEX__HINTS

Full Access
Question # 132

True or False: A 4X-Large Warehouse may, at times, take longer to provision than a X-Small Warehouse.

A.

True

B.

False

Full Access
Question # 133

When unloading to a stage, which of the following is a recommended practice or approach?

A.

Set SINGLE: = true for larger files

B.

Use OBJECT_CONSTRUCT ( * ) when using Parquet

C.

Avoid the use of the CAST function

D.

Define an individual file format

Full Access
Question # 134

When is the result set cache no longer available? (Select TWO)

A.

When another warehouse is used to execute the query

B.

When another user executes the query

C.

When the underlying data has changed

D.

When the warehouse used to execute the query is suspended

E.

When it has been 24 hours since the last query

Full Access
Question # 135

When reviewing a query profile, what is a symptom that a query is too large to fit into the memory?

A.

A single join node uses more than 50% of the query time

B.

Partitions scanned is equal to partitions total

C.

An AggregateOperacor node is present

D.

The query is spilling to remote storage

Full Access
Question # 136

What is the MOST performant file format for loading data in Snowflake?

A.

CSV (Unzipped)

B.

Parquet

C.

CSV (Gzipped)

D.

ORC

Full Access
Question # 137

What data is stored in the Snowflake storage layer? (Select TWO).

A.

Snowflake parameters

B.

Micro-partitions

C.

Query history

D.

Persisted query results

E.

Standard and secure view results

Full Access
Question # 138

Which of the following describes external functions in Snowflake?

A.

They are a type of User-defined Function (UDF).

B.

They contain their own SQL code.

C.

They call code that is stored inside of Snowflake.

D.

They can return multiple rows for each row received

Full Access
Question # 139

Which of the following Snowflake objects can be shared using a secure share? (Select TWO).

A.

Materialized views

B.

Sequences

C.

Procedures

D.

Tables

E.

Secure User Defined Functions (UDFs)

Full Access
Question # 140

Which cache type is used to cache data output from SQL queries?

A.

Metadata cache

B.

Result cache

C.

Remote cache

D.

Local file cache

Full Access
Question # 141

Which of the following are best practice recommendations that should be considered when loading data into Snowflake? (Select TWO).

A.

Load files that are approximately 25 MB or smaller.

B.

Remove all dates and timestamps.

C.

Load files that are approximately 100-250 MB (or larger)

D.

Avoid using embedded characters such as commas for numeric data types

E.

Remove semi-structured data types

Full Access
Question # 142

What is the minimum Snowflake edition required to create a materialized view?

A.

Standard Edition

B.

Enterprise Edition

C.

Business Critical Edition

D.

Virtual Private Snowflake Edition

Full Access
Question # 143

Which semi-structured file formats are supported when unloading data from a table? (Select TWO).

A.

ORC

B.

XML

C.

Avro

D.

Parquet

E.

JSON

Full Access
Question # 144

A user unloaded a Snowflake table called mytable to an internal stage called mystage.

Which command can be used to view the list of files that has been uploaded to the staged?

A.

list @mytable;

B.

list @%raytable;

C.

list @ %m.ystage;

D.

list @mystage;

Full Access
Question # 145

Which copy INTO command outputs the data into one file?

A.

SINGLE=TRUE

B.

MAX_FILE_NUMBER=1

C.

FILE_NUMBER=1

D.

MULTIPLE=FAISE

Full Access
Question # 146

Which data types does Snowflake support when querying semi-structured data? (Select TWO)

A.

VARIANT

B.

ARRAY

C.

VARCHAR

D.

XML

E.

BLOB

Full Access
Question # 147

Which statement about billing applies to Snowflake credits?

A.

Credits are billed per-minute with a 60-minute minimum

B.

Credits are used to pay for cloud data storage usage

C.

Credits are consumed based on the number of credits billed for each hour that a warehouse runs

D.

Credits are consumed based on the warehouse size and the time the warehouse is running

Full Access
Question # 148

What is a machine learning and data science partner within the Snowflake Partner Ecosystem?

A.

Informatica

B.

Power Bl

C.

Adobe

D.

Data Robot

Full Access
Question # 149

How would you determine the size of the virtual warehouse used for a task?

A.

Root task may be executed concurrently (i.e. multiple instances), it is recommended to leave some margins in the execution window to avoid missing instances of execution

B.

Querying (select) the size of the stream content would help determine the warehouse size. For example, if querying large stream content, use a larger warehouse size

C.

If using the stored procedure to execute multiple SQL statements, it's best to test run the stored procedure separately to size the compute resource first

D.

Since task infrastructure is based on running the task body on schedule, it's recommended to configure the virtual warehouse for automatic concurrency handling using Multi-cluster warehouse (MCW) to match the task schedule

Full Access
Question # 150

What is the minimum Snowflake edition required to use Dynamic Data Masking?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPC)

Full Access
Question # 151

A user created a transient table and made several changes to it over the course of several days. Three days after the table was created, the user would like to go back to the first version of the table.

How can this be accomplished?

A.

Use Time Travel, as long as DATA_RETENTION_TIME_IN_DAYS was set to at least 3 days.

B.

The transient table version cannot be retrieved after 24 hours.

C.

Contact Snowflake Support to have the data retrieved from Fail-safe storage.

D.

Use the FAIL_SAFE parameter for Time Travel to retrieve the data from Fail-safe storage.

Full Access
Question # 152

How can a row access policy be applied to a table or a view? (Choose two.)

A.

Within the policy DDL

B.

Within the create table or create view DDL

C.

By future APPLY for all objects in a schema

D.

Within a control table

E.

Using the command ALTER ADD ROW ACCESS POLICY ;

Full Access