ExamGecko
Home Home / Snowflake / COF-C02

Snowflake COF-C02 Practice Test - Questions Answers, Page 65

Question list
Search
Search

Which role must be used to create resource monitors?

A.
SECURITYADMIN
A.
SECURITYADMIN
Answers
B.
ACCOUNTADMIN
B.
ACCOUNTADMIN
Answers
C.
SYSADMIN
C.
SYSADMIN
Answers
D.
ORGADMIN
D.
ORGADMIN
Answers
Suggested answer: B

Explanation:

In Snowflake, the ACCOUNTADMIN role is required to create resource monitors. Resource monitors are used to manage and monitor the consumption of compute resources. The ACCOUNTADMIN role has the necessary privileges to create, configure, and manage resource monitors across the account.

References:

Snowflake Documentation: Resource Monitors

Which command is used to remove files from either external cloud storage or an internal staged

A.
DELETE
A.
DELETE
Answers
B.
REMOVE
B.
REMOVE
Answers
C.
TRUNCATE
C.
TRUNCATE
Answers
D.
DROP
D.
DROP
Answers
Suggested answer: B

Explanation:

The REMOVE command in Snowflake is used to delete files from either external cloud storage locations or internal stages. This command helps manage staged files by removing them when they are no longer needed, which is useful for maintaining organization and managing storage costs.

References:

Snowflake Documentation: REMOVE Command

What persistent data structures are used by the search optimization service to improve the performance of point lookups?

A.
Micro-partitions
A.
Micro-partitions
Answers
B.
Clustering keys
B.
Clustering keys
Answers
C.
Equality searches
C.
Equality searches
Answers
D.
Search access paths
D.
Search access paths
Answers
Suggested answer: D

Explanation:

The search optimization service in Snowflake uses persistent data structures known as search access paths to improve the performance of point lookups. These structures enable efficient retrieval of data by reducing the amount of data scanned during queries.

Search Access Paths:

Search access paths are special indexing structures maintained by the search optimization service.

They store metadata about the distribution of data within tables, enabling faster lookups for specific values.

Point Lookups:

Point lookups involve searching for a specific value within a column.

By leveraging search access paths, Snowflake can quickly locate the exact micro-partition containing the value, minimizing the amount of data scanned.

Performance Improvement:

The use of search access paths significantly reduces query execution time for point lookups.

This is especially beneficial for large tables where scanning all micro-partitions would be computationally expensive.

References:

Snowflake Documentation: Search Optimization Service

Snowflake Documentation: Understanding Search Access Paths

What is a characteristic of a tag associated with a masking policy?

A.
A tag can be dropped after a masking policy is assigned
A.
A tag can be dropped after a masking policy is assigned
Answers
B.
A tag can have only one masking policy for each data type.
B.
A tag can have only one masking policy for each data type.
Answers
C.
A tag can have multiple masking policies for each data type.
C.
A tag can have multiple masking policies for each data type.
Answers
D.
A tag can have multiple masking policies with varying data types
D.
A tag can have multiple masking policies with varying data types
Answers
Suggested answer: B

Explanation:

In Snowflake, a tag can be associated with only one masking policy for each data type. This means that for a given data type, you can define a single masking policy to be applied when a tag is used. Tags and masking policies are part of Snowflake's data classification and governance features, allowing for data masking based on the context defined by the tags.

References:

Snowflake Documentation: Tag-Based Masking Policies

Which function unloads data from a relational table to JSON?

A.
TRUNC<ID_NUMBER, -6)
A.
TRUNC<ID_NUMBER, -6)
Answers
B.
TRUNC(ID_NUMBER, 5)
B.
TRUNC(ID_NUMBER, 5)
Answers
C.
ID_NUMBER*100
C.
ID_NUMBER*100
Answers
D.
TO_CHAR<ID NUMBER)
D.
TO_CHAR<ID NUMBER)
Answers
Suggested answer: D

Explanation:

To unload data from a relational table to JSON format, you can use the TO_CHAR function. This function converts a number to a character string, which can then be serialized into JSON format. While there isn't a direct function specifically named for unloading to JSON, converting the necessary fields to a string representation is a common step in preparing data for JSON serialization.

References:

Snowflake Documentation: TO_CHAR Function

While unloading data into a stage, how can the user ensure that the output will be a single file?

A.
Use the copy option files=single.
A.
Use the copy option files=single.
Answers
B.
Use the COPY Option SINGLE=TRUE .
B.
Use the COPY Option SINGLE=TRUE .
Answers
C.
Use the get option SINGLE-TRUE.
C.
Use the get option SINGLE-TRUE.
Answers
D.
Use the GET option FILES-SINGLE.
D.
Use the GET option FILES-SINGLE.
Answers
Suggested answer: B

Explanation:

To ensure that the output will be a single file when unloading data into a stage, you should use the COPY option SINGLE=TRUE. This option specifies that the result of the COPY INTO command should be written to a single file, rather than multiple files.

References:

Snowflake Documentation: COPY INTO <location>

Which query types will have significant performance improvement when run using the search optimization service? (Select TWO)

A.
Range searches
A.
Range searches
Answers
B.
Equality searches
B.
Equality searches
Answers
C.
Substring searches
C.
Substring searches
Answers
D.
Queries with IN predicates
D.
Queries with IN predicates
Answers
E.
Queries with aggregation
E.
Queries with aggregation
Answers
Suggested answer: A, B

Explanation:

The search optimization service in Snowflake significantly improves the performance of range searches and equality searches. Range searches involve looking for values within a specific range (e.g., BETWEEN, <, >). Equality searches involve looking for values that match a specific value (e.g., =).

References:

Snowflake Documentation: Search Optimization Service

Which Query Profile operator is considered a DML operator?

A.
ExternalScan
A.
ExternalScan
Answers
B.
Flatten
B.
Flatten
Answers
C.
Merge
C.
Merge
Answers
D.
Sort
D.
Sort
Answers
Suggested answer: C

Explanation:

The Merge operator is considered a DML (Data Manipulation Language) operator in Snowflake. DML operators are used to modify data in tables, and the Merge operator specifically allows for conditional updates, inserts, or deletes in a target table based on the results of a join with a source table.

References:

Snowflake Documentation: Query Profile Overview

Snowflake Documentation: MERGE Statement

Who can create and manage reader accounts? (Select TWO).

A.
A user with ACCOUNTADMIN role
A.
A user with ACCOUNTADMIN role
Answers
B.
A user with securityadmin role
B.
A user with securityadmin role
Answers
C.
A user with SYSADMIN role
C.
A user with SYSADMIN role
Answers
D.
A user with ORGADMIH role
D.
A user with ORGADMIH role
Answers
E.
A user with CREATE ACCOUNT privilege
E.
A user with CREATE ACCOUNT privilege
Answers
Suggested answer: A, D

Explanation:

In Snowflake, reader accounts are special types of accounts that allow data sharing with external consumers without them having their own Snowflake account. The creation and management of reader accounts can be performed by users with the ACCOUNTADMIN role or the ORGADMIN role. The ACCOUNTADMIN role has comprehensive administrative privileges within a Snowflake account, including managing other accounts and roles. The ORGADMIN role, which is higher in hierarchy, oversees multiple accounts within an organization and can manage reader accounts across those accounts.

References:

Snowflake Documentation: Creating and Managing Reader Accounts

Masking policies are created at what level in Snowflake?

A.
Table
A.
Table
Answers
B.
Column
B.
Column
Answers
C.
Schema
C.
Schema
Answers
D.
Database
D.
Database
Answers
Suggested answer: B

Explanation:

Masking policies in Snowflake are created and applied at the column level. These policies are used to obfuscate sensitive data by masking the values in a specific column. Masking policies can enforce data privacy and protection measures by dynamically masking the data based on the role of the user querying the data.

References:

Snowflake Documentation: Dynamic Data Masking

Total 716 questions
Go to page: of 72