ExamGecko
Home Home / Snowflake / ADA-C01

Snowflake ADA-C01 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











An Administrator has a table named SALES_DATA which needs some edits, but the Administrator does not want to change the main table data. The Administrator decides to make a transient copy of this table and wants the transient table to have all the same permissions as the original table.

How can the Administrator create the transient table so it inherits the same permissions as the original table, and what considerations need to be made concerning the requirements? (Select TWO).

A.
Use the following SQL command: create transient table TRANSIENT_SALES_DATA as select * from SALES_DATA;
A.
Use the following SQL command: create transient table TRANSIENT_SALES_DATA as select * from SALES_DATA;
Answers
B.
Use the following SQL command: create transient table TRANSIENT SALES DATA as select * from SALES_DATA copy grants;
B.
Use the following SQL command: create transient table TRANSIENT SALES DATA as select * from SALES_DATA copy grants;
Answers
C.
Use the following SQL commands: create transient table TRANSIENT_SALES_DATA like SALES_DATA copy grants; insert into TRANSIENT_SALES_DATA select * from SALES_DATA;
C.
Use the following SQL commands: create transient table TRANSIENT_SALES_DATA like SALES_DATA copy grants; insert into TRANSIENT_SALES_DATA select * from SALES_DATA;
Answers
D.
Transient tables will persist until explicitly dropped and contribute to overall storage costs.
D.
Transient tables will persist until explicitly dropped and contribute to overall storage costs.
Answers
E.
Transient tables will be purged at the end of the user session and do not have any Fail-safe period.
E.
Transient tables will be purged at the end of the user session and do not have any Fail-safe period.
Answers
Suggested answer: B, D

Explanation:

According to the Snowflake documentation1, the COPY GRANTS option can be used to copy all privileges, except OWNERSHIP, from the existing table to the new transient table. This option also preserves any future grants defined for the object type in the schema. Option A is incorrect because it does not copy any grants from the original table. Option C is incorrect because it does not copy the data from the original table, only the structure and grants. Option E is incorrect because transient tables are not session-based and do not have a Fail-safe period, but they do have a Time Travel retention period2.

1: CREATE TABLE | Snowflake Documentation 2: Working with Temporary and Transient Tables | Snowflake Documentation

Which actions are considered breaking changes to data that is shared with consumers in the Snowflake Marketplace? (Select TWO).

A.
Dropping a column from a table
A.
Dropping a column from a table
Answers
B.
Deleting data from a table
B.
Deleting data from a table
Answers
C.
Unpublishing the data listing
C.
Unpublishing the data listing
Answers
D.
Renaming a table
D.
Renaming a table
Answers
E.
Adding region availability to the listing
E.
Adding region availability to the listing
Answers
Suggested answer: A, D

Explanation:

According to the Snowflake documentation1, breaking changes are changes that affect the schema or structure of the shared data, such as dropping or renaming a column or a table. These changes may cause errors or unexpected results for the consumers who query the shared data. Deleting data from a table, unpublishing the data listing, or adding region availability to the listing are not breaking changes, as they do not alter the schema or structure of the shared data.

1: Managing Data Listings in Snowflake Data Marketplace | Snowflake Documentation

What are the MINIMUM grants required on the database, schema, and table for a stream to be properly created and managed?

A.
Database: Usage Schema: Usage Table: Select, Create Stream
A.
Database: Usage Schema: Usage Table: Select, Create Stream
Answers
B.
Database: Usage Schema: Usage Table: Select
B.
Database: Usage Schema: Usage Table: Select
Answers
C.
Database: Usage, Create Stream Schema: Usage Table: Select
C.
Database: Usage, Create Stream Schema: Usage Table: Select
Answers
D.
Database: Usage Schema: Usage, Create Stream Table: Select
D.
Database: Usage Schema: Usage, Create Stream Table: Select
Answers
Suggested answer: A

An Administrator has been asked to support the company's application team need to build a loyalty program for its customers. The customer table contains Personal

Identifiable Information (PII), and the application team's role is DEVELOPER.

CREATE TABLE customer_data (

customer_first_name string,

customer_last_name string,

customer_address string,

customer_email string,

... some other columns,

);

The application team would like to access the customer data, but the email field must be obfuscated.

How can the Administrator protect the sensitive information, while maintaining the usability of the data?

A.
Create a view on the customer_data table to eliminate the email column by omitting it from the SELECT clause. Grant the role DEVELOPER access to the view.
A.
Create a view on the customer_data table to eliminate the email column by omitting it from the SELECT clause. Grant the role DEVELOPER access to the view.
Answers
B.
Create a separate table for all the non-Pll columns and grant the role DEVELOPER access to the new table.
B.
Create a separate table for all the non-Pll columns and grant the role DEVELOPER access to the new table.
Answers
C.
Use the CURRENT_ROLE and CURRENT_USER context functions to integrate with a secure view and filter the sensitive data.
C.
Use the CURRENT_ROLE and CURRENT_USER context functions to integrate with a secure view and filter the sensitive data.
Answers
D.
Use the CURRENT_ROLE context function to integrate with a masking policy on the fields that contain sensitive data.
D.
Use the CURRENT_ROLE context function to integrate with a masking policy on the fields that contain sensitive data.
Answers
Suggested answer: D

An organization's sales team leverages this Snowflake query a few times a day:

SELECT CUSTOMER ID, CUSTOMER_NAME, ADDRESS, PHONE NO

FROM CUSTOMERS

WHERE LAST UPDATED BETWEEN TO_DATE (CURRENT_TIMESTAMP) AND (TO_DATE (CURRENT_TIMESTAMP) -7);

What can the Snowflake Administrator do to optimize the use of persisted query results whenever possible?

A.
Wrap the query in a User-Defined Function (UDF) to match syntax execution.
A.
Wrap the query in a User-Defined Function (UDF) to match syntax execution.
Answers
B.
Assign everyone on the sales team to the same virtual warehouse.
B.
Assign everyone on the sales team to the same virtual warehouse.
Answers
C.
Assign everyone on the sales team to the same security role.
C.
Assign everyone on the sales team to the same security role.
Answers
D.
Leverage the CURRENT_DATE function for date calculations.
D.
Leverage the CURRENT_DATE function for date calculations.
Answers
Suggested answer: D

Explanation:

According to the web search results from my predefined tool search_web, one of the factors that affects the reuse of persisted query results is the exact match of the query syntax1. If the query contains functions that return different values for successive runs, such as CURRENT_TIMESTAMP, then the query will not match the previous query and will not benefit from the cache. To avoid this, the query should use functions that return consistent values for the same day, such as CURRENT_DATE, which returns the current date without the time component2. Option A is incorrect because wrapping the query in a UDF does not guarantee the syntax match, as the UDF may also contain dynamic functions. Option B is incorrect because the virtual warehouse does not affect the persisted query results, which are stored at the account level1. Option C is incorrect because the security role does not affect the persisted query results, as long as the role has the necessary privileges to access the tables and views used in the query1.

1: Using Persisted Query Results | Snowflake Documentation 2: Date and Time Functions | Snowflake Documentation

Which tasks can be performed by the ORGADMIN role? (Select THREE).

A.
Create one or more accounts in the organization.
A.
Create one or more accounts in the organization.
Answers
B.
View a list of all regions enabled for the organization.
B.
View a list of all regions enabled for the organization.
Answers
C.
Create secure views on application tables within the organization.
C.
Create secure views on application tables within the organization.
Answers
D.
View usage information for all accounts in the organization.
D.
View usage information for all accounts in the organization.
Answers
E.
Perform zero-copy cloning on account data.
E.
Perform zero-copy cloning on account data.
Answers
F.
Create a reader account to share data with another organization.
F.
Create a reader account to share data with another organization.
Answers
Suggested answer: A, B, D

Explanation:

A user with the ORGADMIN role can perform the following tasks1:

* Create one or more accounts in the organization.

* View a list of all regions enabled for the organization.

* View usage information for all accounts in the organization.

Option C is incorrect because creating secure views on application tables is not a function of the ORGADMIN role, but rather a function of the roles that have access to the tables and schemas within the accounts. Option E is incorrect because performing zero-copy cloning on account data is not a function of the ORGADMIN role, but rather a function of the roles that have the CLONE privilege on the objects within the accounts. Option F is incorrect because creating a reader account to share data with another organization is not a function of the ORGADMIN role, but rather a function of the roles that have the CREATE SHARE privilege on the objects within the accounts.

What role or roles should be used to properly create the object required to setup OAuth 2.0 integration?

A.
Any role with GRANT USAGE on SECURITY INTEGRATION
A.
Any role with GRANT USAGE on SECURITY INTEGRATION
Answers
B.
ACCOUNTADMIN and SYSADMIN
B.
ACCOUNTADMIN and SYSADMIN
Answers
C.
ACCOUNTADMIN and SECURITYADMIN
C.
ACCOUNTADMIN and SECURITYADMIN
Answers
D.
ACCOUNTADMIN only
D.
ACCOUNTADMIN only
Answers
Suggested answer: D

Explanation:

According to the Using OAuth 2.0 with Snowflake - Blog, only the ACCOUNTADMIN role can create and manage integrations, so an administrator must assume that role when creating a security integration for OAuth. The other roles do not have the necessary privileges to create the object required to setup OAuth 2.0 integration.

The following SQL command was executed:

Use role SECURITYADMIN;

Grant ownership

On future tables

In schema PROD. WORKING

To role PROD_WORKING_OWNER;

Grant role PROD_WORKING_OWNER to role SYSADMIN;

Use role ACCOUNTADMIN;

Create table PROD.WORKING.XYZ (value number) ;

Which role(s) can alter or drop table XYZ?

A.
Because ACCOUNTADMIN created the table, only the ACCOUNTADMIN role can alter or drop table XYZ.
A.
Because ACCOUNTADMIN created the table, only the ACCOUNTADMIN role can alter or drop table XYZ.
Answers
B.
SECURITYADMIN, SYSADMIN, and ACCOUNTADMIN can alter or drop table XYZ.
B.
SECURITYADMIN, SYSADMIN, and ACCOUNTADMIN can alter or drop table XYZ.
Answers
C.
PROD_WORKING_OWNER, ACCOUNTADMIN, and SYSADMIN can alter or drop table XYZ.
C.
PROD_WORKING_OWNER, ACCOUNTADMIN, and SYSADMIN can alter or drop table XYZ.
Answers
D.
Only the PROD_WORKING_OWNER role can alter or drop table XYZ.
D.
Only the PROD_WORKING_OWNER role can alter or drop table XYZ.
Answers
Suggested answer: C

Explanation:

According to the GRANT OWNERSHIP documentation, the ownership privilege grants full control over the table and can only be held by one role at a time. However, the current owner can also grant the ownership privilege to another role, which transfers the ownership to the new role. In this case, the SECURITYADMIN role granted the ownership privilege on future tables in the PROD.WORKING schema to the PROD_WORKING_OWNER role. This means that any table created in that schema after the grant statement will be owned by the PROD_WORKING_OWNER role. Therefore, the PROD_WORKING_OWNER role can alter or drop table XYZ, which was created by the ACCOUNTADMIN role in the PROD.WORKING schema. Additionally, the ACCOUNTADMIN role can also alter or drop table XYZ, because it is the top-level role that has all privileges on all objects in the account. Furthermore, the SYSADMIN role can also alter or drop table XYZ, because it was granted the PROD_WORKING_OWNER role by the SECURITYADMIN role. The SYSADMIN role can activate the PROD_WORKING_OWNER role and inherit its privileges, including the ownership privilege on table XYZ. The SECURITYADMIN role cannot alter or drop table XYZ, because it does not have the ownership privilege on the table, nor does it have the PROD_WORKING_OWNER role.

When adding secure views to a share in Snowflake, which function is needed to authorize users from another account to access rows in a base table?

A.
CURRENT_ROLE
A.
CURRENT_ROLE
Answers
B.
CURRENT ACCOUNT
B.
CURRENT ACCOUNT
Answers
C.
CURRENT_USER
C.
CURRENT_USER
Answers
D.
CURRENT_CLIENT
D.
CURRENT_CLIENT
Answers
Suggested answer: C

Explanation:

According to the Working with Secure Views documentation, secure views are designed to limit access to sensitive data that should not be exposed to all users of the underlying table(s). When sharing secure views with another account, the view definition must include a function that returns the identity of the user who is querying the view, such as CURRENT_USER, CURRENT_ROLE, or CURRENT_ACCOUNT. These functions can be used to filter the rows in the base table based on the user's identity. For example, a secure view can use the CURRENT_USER function to compare the user name with a column in the base table that contains the authorized user names. Only the rows that match the user name will be returned by the view. The CURRENT_CLIENT function is not suitable for this purpose, because it returns the IP address of the client that is connected to Snowflake, which is not related to the user's identity.

In which scenario will use of an external table simplify a data pipeline?

A.
When accessing a Snowflake table from a relational database
A.
When accessing a Snowflake table from a relational database
Answers
B.
When accessing a Snowflake table from an external database within the same region
B.
When accessing a Snowflake table from an external database within the same region
Answers
C.
When continuously writing data from a Snowflake table to external storage
C.
When continuously writing data from a Snowflake table to external storage
Answers
D.
When accessing a Snowflake table that references data files located in cloud storage
D.
When accessing a Snowflake table that references data files located in cloud storage
Answers
Suggested answer: D

Explanation:

According to the Introduction to External Tables documentation, an external table is a Snowflake feature that allows you to query data stored in an external stage as if the data were inside a table in Snowflake. The external stage is not part of Snowflake, so Snowflake does not store or manage the stage. This simplifies the data pipeline by eliminating the need to load the data into Snowflake before querying it. External tables can access data stored in any format that the COPY INTO <table> command supports, such as CSV, JSON, AVRO, ORC, or PARQUET. The other scenarios do not involve external tables, but rather require data loading, unloading, or federation.

Total 72 questions
Go to page: of 8