Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

COF-R02 Exam Dumps - SnowPro Core Recertification Exam

Go to page:
Question # 41

What versions of Snowflake should be used to manage compliance with Personal Identifiable Information (PII) requirements? (Choose two.)

A.

Custom Edition

B.

Virtual Private Snowflake

C.

Business Critical Edition

D.

Standard Edition

E.

Enterprise Edition

Full Access
Question # 42

A user created a transient table and made several changes to it over the course of several days. Three days after the table was created, the user would like to go back to the first version of the table.

How can this be accomplished?

A.

Use Time Travel, as long as DATA_RETENTION_TIME_IN_DAYS was set to at least 3 days.

B.

The transient table version cannot be retrieved after 24 hours.

C.

Contact Snowflake Support to have the data retrieved from Fail-safe storage.

D.

Use the FAIL_SAFE parameter for Time Travel to retrieve the data from Fail-safe storage.

Full Access
Question # 43

Which of the following objects can be directly restored using the UNDROP command? (Choose two.)

A.

Schema

B.

View

C.

Internal stage

D.

Table

E.

User

F.

Role

Full Access
Question # 44

The bulk data load history that is available upon completion of the COPY statement is stored where and for how long?

A.

In the metadata of the target table for 14 days

B.

In the metadata of the pipe for 14 days

C.

In the metadata of the target table for 64 days

D.

In the metadata of the pipe for 64 days

Full Access
Question # 45

True or False: When you create a custom role, it is a best practice to immediately grant that role to ACCOUNTADMIN.

A.

True

B.

False

Full Access
Question # 46

Which of the following describes how clustering keys work in Snowflake?

A.

Clustering keys update the micro-partitions in place with a full sort, and impact the DML operations.

B.

Clustering keys sort the designated columns over time, without blocking DML operations

C.

Clustering keys create a distributed, parallel data structure of pointers to a table's rows and columns

D.

Clustering keys establish a hashed key on each node of a virtual warehouse to optimize joins at run-time

Full Access
Question # 47

What is a key feature of Snowflake architecture?

A.

Zero-copy cloning creates a mirror copy of a database that updates with the original

B.

Software updates are automatically applied on a quarterly basis

C.

Snowflake eliminates resource contention with its virtual warehouse implementation

D.

Multi-cluster warehouses allow users to run a query that spans across multiple clusters

E.

Snowflake automatically sorts DATE columns during ingest for fast retrieval by date

Full Access
Question # 48

User-level network policies can be created by which of the following roles? (Select TWO).

A.

ROLEADMIN

B.

ACCOUNTADMIN

C.

SYSADMIN

D.

SECURITYADMIN

E.

USERADMIN

Full Access
Go to page: