ExamGecko
Home Home / Snowflake / COF-C02

Snowflake COF-C02 Practice Test - Questions Answers, Page 42

Question list
Search
Search

Which views are included in the DATA SHARING USAGE schema? (Select TWO).

A.
ACCESS_HISTORY
A.
ACCESS_HISTORY
Answers
B.
DATA_TRANSFER_HISTORY
B.
DATA_TRANSFER_HISTORY
Answers
C.
WAREHOUSE_METERING_HISTORY
C.
WAREHOUSE_METERING_HISTORY
Answers
D.
MONETIZED_USAGE_DAILY
D.
MONETIZED_USAGE_DAILY
Answers
E.
LISTING TELEMETRY DAILY
E.
LISTING TELEMETRY DAILY
Answers
Suggested answer: D, E

Explanation:

The DATA_SHARING_USAGE schema includes views that display information about listings published in the Snowflake Marketplace or a data exchange, which includes DATA_TRANSFER_HISTORY and LISTING_TELEMETRY_DAILY2.

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.
SELECT
A.
SELECT
Answers
B.
OWNERSHIP
B.
OWNERSHIP
Answers
C.
MONITOR
C.
MONITOR
Answers
D.
MODIFY
D.
MODIFY
Answers
E.
USAGE
E.
USAGE
Answers
Suggested answer: C, D

Explanation:

To view and modify resource monitors, the least privileges needed are MONITOR and MODIFY.These privileges allow a user to monitor credit usage and make changes to resource monitors3.

How can a Snowflake user traverse semi-structured data?

A.
Insert a colon (:) between the VARIANT column name and any first-level element.
A.
Insert a colon (:) between the VARIANT column name and any first-level element.
Answers
B.
Insert a colon (:) between the VARIANT column name and any second-level element.
B.
Insert a colon (:) between the VARIANT column name and any second-level element.
Answers
C.
Insert a double colon (: :) between the VARIANT column name and any first-level element.
C.
Insert a double colon (: :) between the VARIANT column name and any first-level element.
Answers
D.
Insert a double colon (: :) between the VARIANT column name and any second-level element.
D.
Insert a double colon (: :) between the VARIANT column name and any second-level element.
Answers
Suggested answer: A

Explanation:

To traverse semi-structured data in Snowflake, a user can insert a colon (:) between the VARIANT column name and any first-level element.This path syntax is used to retrieve elements in a VARIANT column4.

What is the purpose of the Snowflake SPLIT TO_TABLE function?

A.
To count the number of characters in a string
A.
To count the number of characters in a string
Answers
B.
To split a string into an array of sub-strings
B.
To split a string into an array of sub-strings
Answers
C.
To split a string and flatten the results into rows
C.
To split a string and flatten the results into rows
Answers
D.
To split a string and flatten the results into columns
D.
To split a string and flatten the results into columns
Answers
Suggested answer: C

Explanation:

The purpose of the Snowflake SPLIT_TO_TABLE function is to split a string based on a specified delimiter and flatten the results into rows.This table function is useful for transforming a delimited string into a set of rows that can be further processed or queried5.

A column named 'Data' contains VARIANT data and stores values as follows:

How will Snowflake extract the employee's name from the column data?

A.
Data:employee.name
A.
Data:employee.name
Answers
B.
DATA:employee.name
B.
DATA:employee.name
Answers
C.
data:Employee.name
C.
data:Employee.name
Answers
D.
data:employee.name
D.
data:employee.name
Answers
Suggested answer: D

Explanation:

In Snowflake, to extract a specific value from a VARIANT column, you use the column name followed by a colon and then the key. The keys are case-sensitive. Therefore, to extract the employee's name from the ''Data'' column, the correct syntax isdata:employee.name.

Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?

A.
OAuth
A.
OAuth
Answers
B.
Network policies
B.
Network policies
Answers
C.
Single Sign-On (SSO)
C.
Single Sign-On (SSO)
Answers
D.
Multi-Factor Authentication (MFA)
D.
Multi-Factor Authentication (MFA)
Answers
Suggested answer: D

Explanation:

Multi-Factor Authentication (MFA) provides increased login security for users connecting to Snowflake. Snowflake's MFA is powered by Duo Security service, which adds an additional layer of security during the login process.

A Snowflake account has activated federated authentication.

What will occur when a user with a password that was defined by Snowflake attempts to log in to Snowflake?

A.
The user will be unable to enter a password.
A.
The user will be unable to enter a password.
Answers
B.
The user will encounter an error, and will not be able to log in.
B.
The user will encounter an error, and will not be able to log in.
Answers
C.
The user will be able to log into Snowflake successfully.
C.
The user will be able to log into Snowflake successfully.
Answers
D.
After entering the username and password, the user will be redirected to an Identity Provider (IdP) login page.
D.
After entering the username and password, the user will be redirected to an Identity Provider (IdP) login page.
Answers
Suggested answer: A

Explanation:

When federated authentication is activated in Snowflake, users authenticate via an external identity provider (IdP) rather than using Snowflake-managed credentials. Therefore, a user with a password defined by Snowflake will be unable to enter a password and must use their IdP credentials to log in.

What value provides information about disk usage for operations where intermediate results do not fit in memory in a Query Profile?

A.
IO
A.
IO
Answers
B.
Network
B.
Network
Answers
C.
Pruning
C.
Pruning
Answers
D.
Spilling
D.
Spilling
Answers
Suggested answer: D

Explanation:

In Snowflake, when a query execution requires more memory than what is available, Snowflake handles these situations by spilling the intermediate results to disk. This process is known as 'spilling.' The Query Profile in Snowflake includes a metric that helps users identify when and how much data spilling occurs during the execution of a query. This information is crucial for optimizing queries as excessive spilling can significantly slow down query performance. The value that provides this information about disk usage due to intermediate results not fitting in memory is appropriately labeled as 'Spilling' in the Query Profile.

References:

Snowflake Documentation on Query Profile and Performance: This section explains the various components of the query profile, including the spilling metric, which indicates disk usage for operations where intermediate results exceed available memory.

What information is found within the Statistic output in the Query Profile Overview?

A.
Operator tree
A.
Operator tree
Answers
B.
Table pruning
B.
Table pruning
Answers
C.
Most expensive nodes
C.
Most expensive nodes
Answers
D.
Nodes by execution time
D.
Nodes by execution time
Answers
Suggested answer: C

Explanation:

The Statistic output in the Query Profile Overview of Snowflake provides detailed insights into the performance of different parts of the query. Specifically, it highlights the 'Most expensive nodes,' which are the operations or steps within the query execution that consume the most resources, such as CPU and memory. Identifying these nodes helps in pinpointing performance bottlenecks and optimizing query execution by focusing efforts on the most resource-intensive parts of the query.

References:

Snowflake Documentation on Query Profile Overview: It details the components of the profile overview, emphasizing how to interpret the statistics section to improve query performance by understanding which nodes are most resource-intensive.

How do secure views compare to non-secure views in Snowflake?

A.
Secure views execute slowly compared to non-secure views.
A.
Secure views execute slowly compared to non-secure views.
Answers
B.
Non-secure views are preferred over secure views when sharing data.
B.
Non-secure views are preferred over secure views when sharing data.
Answers
C.
Secure views are similar to materialized views in that they are the most performant.
C.
Secure views are similar to materialized views in that they are the most performant.
Answers
D.
There are no performance differences between secure and non-secure views.
D.
There are no performance differences between secure and non-secure views.
Answers
Suggested answer: D

Explanation:

Secure views and non-secure views in Snowflake are differentiated primarily by their handling of data access and security rather than performance characteristics. A secure view enforces row-level security and ensures that the view definition is hidden from the users. However, in terms of performance, secure views do not inherently execute slower or faster than non-secure views. The performance of both types of views depends more on other factors such as underlying table design, query complexity, and system workload rather than the security features embedded in the views themselves.

References:

Snowflake Documentation on Views: This section provides an overview of both secure and non-secure views, clarifying that the main difference lies in security features rather than performance, thus supporting the assertion that there are no inherent performance differences.

Total 716 questions
Go to page: of 72