ExamGecko
Home Home / Snowflake / COF-C02

Snowflake COF-C02 Practice Test - Questions Answers, Page 35

Question list
Search
Search

What will prevent unauthorized access to a Snowflake account from an unknown source?

A.
Network policy
A.
Network policy
Answers
B.
End-to-end encryption
B.
End-to-end encryption
Answers
C.
Multi-Factor Authentication (MFA)
C.
Multi-Factor Authentication (MFA)
Answers
D.
Role-Based Access Control (RBAC)
D.
Role-Based Access Control (RBAC)
Answers
Suggested answer: A

Explanation:

A network policy in Snowflake is used to restrict access to the Snowflake account from unauthorized or unknown sources.It allows administrators to specify allowed IP address ranges, thus preventing access from any IP addresses not listed in the policy1.

What is the purpose of a Query Profile?

A.
To profile how many times a particular query was executed and analyze its u^age statistics over time.
A.
To profile how many times a particular query was executed and analyze its u^age statistics over time.
Answers
B.
To profile a particular query to understand the mechanics of the query, its behavior, and performance.
B.
To profile a particular query to understand the mechanics of the query, its behavior, and performance.
Answers
C.
To profile the user and/or executing role of a query and all privileges and policies applied on the objects within the query.
C.
To profile the user and/or executing role of a query and all privileges and policies applied on the objects within the query.
Answers
D.
To profile which queries are running in each warehouse and identify proper warehouse utilization and sizing for better performance and cost balancing.
D.
To profile which queries are running in each warehouse and identify proper warehouse utilization and sizing for better performance and cost balancing.
Answers
Suggested answer: B

Explanation:

The purpose of a Query Profile is to provide a detailed analysis of a particular query's execution plan, including the mechanics, behavior, and performance.It helps in identifying potential performance bottlenecks and areas for optimization

When enabling access to unstructured data, which URL permits temporary access to a staged file without the need to grant privileges to the stage or to issue access tokens?

A.
File URL
A.
File URL
Answers
B.
Scoped URL
B.
Scoped URL
Answers
C.
Relative URL
C.
Relative URL
Answers
D.
Pre-Signed URL
D.
Pre-Signed URL
Answers
Suggested answer: B

Explanation:

A Scoped URL permits temporary access to a staged file without the need to grant privileges to the stage or to issue access tokens.It provides a secure way to share access to files stored in Snowflake

What is the minimum Snowflake Edition that supports secure storage of Protected Health Information (PHI) data?

A.
Standard Edition
A.
Standard Edition
Answers
B.
Enterprise Edition
B.
Enterprise Edition
Answers
C.
Business Critical Edition
C.
Business Critical Edition
Answers
D.
Virtual Private Snowflake Edition
D.
Virtual Private Snowflake Edition
Answers
Suggested answer: C

Explanation:

The minimum Snowflake Edition that supports secure storage of Protected Health Information (PHI) data is the Business Critical Edition.This edition offers enhanced security features necessary for compliance with regulations such as HIPAA and HITRUST CSF4.

What metadata does Snowflake store for rows in micro-partitions? (Select TWO).

A.
Range of values
A.
Range of values
Answers
B.
Distinct values
B.
Distinct values
Answers
C.
Index values
C.
Index values
Answers
D.
Sorted values
D.
Sorted values
Answers
E.
Null values
E.
Null values
Answers
Suggested answer: A, B

Explanation:

Snowflake stores metadata for rows in micro-partitions, including the range of values for each column and the number of distinct values1.

Which statistics are displayed in a Query Profile that indicate that intermediate results do not fit in memory? (Select TWO).

A.
Bytes scanned
A.
Bytes scanned
Answers
B.
Partitions scanned
B.
Partitions scanned
Answers
C.
Bytes spilled to local storage
C.
Bytes spilled to local storage
Answers
D.
Bytes spilled to remote storage
D.
Bytes spilled to remote storage
Answers
E.
Percentage scanned from cache
E.
Percentage scanned from cache
Answers
Suggested answer: C, D

Explanation:

The Query Profile statistics that indicate intermediate results do not fit in memory are the bytes spilled to local storage and bytes spilled to remote storage2.

How can a Snowflake user validate data that is unloaded using the COPY INTO <location> command?

A.
Load the data into a CSV file.
A.
Load the data into a CSV file.
Answers
B.
Load the data into a relational table.
B.
Load the data into a relational table.
Answers
C.
Use the VALlDATlON_MODE - SQL statement.
C.
Use the VALlDATlON_MODE - SQL statement.
Answers
D.
Use the validation mode = return rows statement.
D.
Use the validation mode = return rows statement.
Answers
Suggested answer: C

Explanation:

To validate data unloaded using the COPY INTO <location> command, a Snowflake user can use the VALIDATION_MODE parameter within the SQL statement to test the files for errors without loading them3.

At what level is the MIN_DATA_RETENTION_TIME_IN_DAYS parameter set?

A.
Account
A.
Account
Answers
B.
Database
B.
Database
Answers
C.
Schema
C.
Schema
Answers
D.
Table
D.
Table
Answers
Suggested answer: A

Explanation:

The MIN_DATA_RETENTION_TIME_IN_DAYS parameter is set at the account level.This parameter determines the minimum number of days Snowflake retains historical data for Time Travel operations

What tasks can an account administrator perform in the Data Exchange? (Select TWO).

A.
Add and remove members.
A.
Add and remove members.
Answers
B.
Delete data categories.
B.
Delete data categories.
Answers
C.
Approve and deny listing approval requests.
C.
Approve and deny listing approval requests.
Answers
D.
Transfer listing ownership.
D.
Transfer listing ownership.
Answers
E.
Transfer ownership of a provider profile.
E.
Transfer ownership of a provider profile.
Answers
Suggested answer: A, C

Explanation:

An account administrator in the Data Exchange can perform tasks such as adding and removing members and approving or denying listing approval requests.These tasks are part of managing the Data Exchange and ensuring that only authorized listings and members are part of it12.

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.
Bytes scanned
A.
Bytes scanned
Answers
B.
Bytes written to result
B.
Bytes written to result
Answers
C.
Partitions scanned
C.
Partitions scanned
Answers
D.
Partitions total
D.
Partitions total
Answers
E.
Percentage scanned from cache
E.
Percentage scanned from cache
Answers
Suggested answer: C, D

Explanation:

The statistics that can be used to identify queries with inefficient pruning are 'Partitions scanned' and 'Partitions total'.These statistics indicate how much of the data was actually needed and scanned versus the total available, which can highlight inefficiencies in data pruning34.

Total 716 questions
Go to page: of 72