ExamGecko
Home Home / Snowflake / COF-C02

Snowflake COF-C02 Practice Test - Questions Answers, Page 57

Question list
Search
Search

Which Snowflake database object can be shared with other accounts?

A.
Tasks
A.
Tasks
Answers
B.
Pipes
B.
Pipes
Answers
C.
Secure User-Defined Functions (UDFs)
C.
Secure User-Defined Functions (UDFs)
Answers
D.
Stored Procedures
D.
Stored Procedures
Answers
Suggested answer: C

Explanation:

In Snowflake, Secure User-Defined Functions (UDFs) can be shared with other accounts using Snowflake's data sharing feature. This allows different Snowflake accounts to securely execute the UDFs without having direct access to the underlying data the functions operate on, ensuring privacy and security. The sharing is facilitated through shares created in Snowflake, which can contain Secure UDFs along with other database objects like tables and views. References: Snowflake Documentation on Data Sharing and Secure UDFs

What does Snowflake attempt to do if any of the compute resources for a virtual warehouse fail to provision during start-up?

A.
Repair the failed resources.
A.
Repair the failed resources.
Answers
B.
Restart failed resources.
B.
Restart failed resources.
Answers
C.
Queue the failed resources
C.
Queue the failed resources
Answers
D.
Provision the failed resources
D.
Provision the failed resources
Answers
Suggested answer: B

Explanation:

If any compute resources for a virtual warehouse fail to provision during startup, Snowflake will attempt to restart those failed resources. The system is designed to automatically handle transient issues that might occur during the provisioning of compute resources. By restarting the failed resources, Snowflake aims to ensure that the virtual warehouse has the necessary compute capacity to handle the user's workloads without manual intervention. References: Snowflake Documentation on Virtual Warehouses

A JSON document is stored in the source_colum of type VARIANT. The document has an array called elements. The array contains the name key that has a string value How can a Snowflake user extract the name from the first element?

A.
Source_column.element[1]:name
A.
Source_column.element[1]:name
Answers
B.
Source_column.element[0]:name
B.
Source_column.element[0]:name
Answers
C.
Source_column.element[1].name
C.
Source_column.element[1].name
Answers
D.
Source_column.element[0]:name
D.
Source_column.element[0]:name
Answers
Suggested answer: C

Explanation:

In Snowflake, when dealing with semi-structured data such as a JSON document stored in a VARIANT column, the proper syntax to extract a value is to use the column name followed by the path to the specific element. Since arrays in JSON are zero-indexed, the first element is referenced with [0]. Therefore, to extract the name from the first element of the elements array, the correct syntax is Source_column:elements[0].name. References: Snowflake Documentation on Semi-Structured Data

Which key access control concept does Snowflake descibe as a defined level of access to an object?

A.
Grant
A.
Grant
Answers
B.
Privilege
B.
Privilege
Answers
C.
Role
C.
Role
Answers
D.
Session
D.
Session
Answers
Suggested answer: B

Explanation:

In Snowflake, the term 'privilege' refers to a defined level of access to an object. Privileges are specific actions that roles can perform on securable objects in Snowflake, such as tables, views, warehouses, databases, and schemas. These privileges are granted to roles and can be further granted to users through their roles, forming the basis of Snowflake's access control framework. References: Snowflake Documentation on Access Control Privileges

Snowflake's access control framework combines which models for securing data? (Select TWO).

A.
Attribute-based Access Control (ABAC 1
A.
Attribute-based Access Control (ABAC 1
Answers
B.
Discretionary Access Control (DAC)
B.
Discretionary Access Control (DAC)
Answers
C.
Access Control List (ACL)
C.
Access Control List (ACL)
Answers
D.
Role-based Access Control (RBAC)
D.
Role-based Access Control (RBAC)
Answers
E.
Rule-based Access Control (RuBAC)
E.
Rule-based Access Control (RuBAC)
Answers
Suggested answer: B, D

Explanation:

Snowflake's access control framework utilizes a combination of Discretionary Access Control (DAC) and Role-based Access Control (RBAC). DAC in Snowflake allows the object owner to grant access privileges to other roles. RBAC involves assigning roles to users and then granting privileges to those roles. Through roles, Snowflake manages which users have access to specific objects and what actions they can perform, which is central to security and governance in the Snowflake environment. References: Snowflake Documentation on Access Control,

What does Snowflake recommend a user do if they need to connect to Snowflake with a tool or technology mat is not listed in Snowflake partner ecosystem?

A.
Use Snowflake's native API.
A.
Use Snowflake's native API.
Answers
B.
Use a custom-built connector.
B.
Use a custom-built connector.
Answers
C.
Contact Snowflake Support for a new driver.
C.
Contact Snowflake Support for a new driver.
Answers
D.
Connect through Snowflake's JDBC or ODBC drivers
D.
Connect through Snowflake's JDBC or ODBC drivers
Answers
Suggested answer: D

Explanation:

If a user needs to connect to Snowflake with a tool or technology that is not listed in Snowflake's partner ecosystem, Snowflake recommends using its JDBC or ODBC drivers. These drivers provide a standard method of connecting from various tools and programming languages to Snowflake, offering wide compatibility and flexibility. By using these drivers, users can establish connections to Snowflake from their applications, ensuring they can leverage the capabilities of Snowflake regardless of the specific tools or technologies they are using. References: Snowflake Documentation on Client Drivers

How should a Snowflake use' configure a virtual warehouse to be in Maximized mode''

A.
Set the WAREHOUSES_SIZE to 6XL.
A.
Set the WAREHOUSES_SIZE to 6XL.
Answers
B.
Set the STATEMENT_TIMEOUT_1M_SECOMES to 0.
B.
Set the STATEMENT_TIMEOUT_1M_SECOMES to 0.
Answers
C.
Set the MAX_CONCURRENCY_LEVEL to a value of 12 or large.
C.
Set the MAX_CONCURRENCY_LEVEL to a value of 12 or large.
Answers
D.
Set the same value for both MIN_CLUSTER_COUNT and MAX_CLUSTER_COUNT.
D.
Set the same value for both MIN_CLUSTER_COUNT and MAX_CLUSTER_COUNT.
Answers
Suggested answer: D

Explanation:

In Snowflake, configuring a virtual warehouse to be in a 'Maximized' mode implies maximizing the resources allocated to the warehouse for its duration. This is done to ensure that the warehouse has a consistent amount of compute resources available, enhancing performance for workloads that require a high level of parallel processing or for handling high query volumes.

To configure a virtual warehouse in maximized mode, you should set the same value for both MIN_CLUSTER_COUNT and MAX_CLUSTER_COUNT. This configuration ensures that the warehouse operates with a fixed number of clusters, thereby providing a stable and maximized level of compute resources.

Reference to Snowflake documentation on warehouse sizing and scaling:

Warehouse Sizing and Scaling

Understanding Warehouses

Which system_defined, read-only view display information on column lineage that specifies how data flows from source to target in a SQL write operation?

A.
ACCESS_HISTORY
A.
ACCESS_HISTORY
Answers
B.
LOAD_HOSTORY
B.
LOAD_HOSTORY
Answers
C.
QUERY_HISTORY
C.
QUERY_HISTORY
Answers
D.
COPY_HISTORY
D.
COPY_HISTORY
Answers
Suggested answer: A

Explanation:

In Snowflake, the system-defined, read-only view that displays information on column lineage, which specifies how data flows from source to target in a SQL write operation, is ACCESS_HISTORY. This view is instrumental in auditing and analyzing data access patterns, as it provides detailed insights into how and from where the data is being accessed and manipulated within Snowflake.

Reference to Snowflake documentation on ACCESS_HISTORY:

Using Access History to Audit Data Access

When snaring data in Snowflake. what privileges does a Provider need to grant along with a share? (Select TWO).

A.
USAGE on the specific tables in the database.
A.
USAGE on the specific tables in the database.
Answers
B.
USAGE on the specific tables in the database.
B.
USAGE on the specific tables in the database.
Answers
C.
MODIFY on 1Mb specific tables in the database.
C.
MODIFY on 1Mb specific tables in the database.
Answers
D.
USAGE on the database and the schema containing the tables to share
D.
USAGE on the database and the schema containing the tables to share
Answers
E.
OPEBATE on the database and the schema containing the tables to share.
E.
OPEBATE on the database and the schema containing the tables to share.
Answers
Suggested answer: A, D

Explanation:

When sharing data in Snowflake, the provider needs to grant the following privileges along with a share:

A . USAGE on the specific tables in the database: This privilege allows the consumers of the share to access the specific tables included in the share.

D . USAGE on the database and the schema containing the tables to share: This privilege is necessary for the consumers to access the database and schema levels, enabling them to access the tables within those schemas.

These privileges are crucial for setting up secure and controlled access to the shared data, ensuring that only authorized users can access the specified resources.

Reference to Snowflake documentation on sharing data and managing access:

Data Sharing Overview

Privileges Required for Sharing Data

Which view in SNOWFLAKE.ACCOUNT_USAGE shows from which IP address a user connected to Snowflak?

A.
ACCESS_HOSTORY
A.
ACCESS_HOSTORY
Answers
B.
LOGIN_HISTORY
B.
LOGIN_HISTORY
Answers
C.
SESSIONS
C.
SESSIONS
Answers
D.
QUERY HISTORY
D.
QUERY HISTORY
Answers
Suggested answer: B

Explanation:

The LOGIN_HISTORY view in SNOWFLAKE.ACCOUNT_USAGE shows from which IP address a user connected to Snowflake. This view is particularly useful for auditing and monitoring purposes, as it helps administrators track login attempts, successful logins, and the geographical location of users based on their IP addresses.

Reference to Snowflake documentation on LOGIN_HISTORY:

Monitoring Login Attempts

Total 716 questions
Go to page: of 72