ExamGecko
Question list
Search
Search

Question 29 - COF-C02 discussion

Report
Export

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

A.
SCIM
Answers
A.
SCIM
B.
Federated authentication
Answers
B.
Federated authentication
C.
TLS 1.2
Answers
C.
TLS 1.2
D.
Key-pair authentication
Answers
D.
Key-pair authentication
E.
OAuth
Answers
E.
OAuth
F.
OCSP authentication
Answers
F.
OCSP authentication
Suggested answer: B, D, E

Explanation:

Snowflake supports several methods for authenticating users, includingfederated authentication,key-pair authentication, andOAuth. Federated authentication allows users to authenticate using their organization's identity provider. Key-pair authentication uses a public-private key pair for secure login, and OAuth is an open standard for access delegation commonly used for token-based authentication.References:Authentication policies | Snowflake Documentation,Authenticating to the server | Snowflake Documentation,External API authentication and secrets | Snowflake Documentation.

asked 23/09/2024
Marcel Wienhusen
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first