ExamGecko
Home Home / Snowflake / SnowPro Core

Snowflake SnowPro Core Practice Test - Questions Answers, Page 49

Question list
Search
Search

What are characteristics of reader accounts in Snowflake? (Select TWO).

A.

Reader account users cannot add new data to the account.

A.

Reader account users cannot add new data to the account.

Answers
B.

Reader account users can share data to other reader accounts.

B.

Reader account users can share data to other reader accounts.

Answers
C.

A single reader account can consume data from multiple provider accounts.

C.

A single reader account can consume data from multiple provider accounts.

Answers
D.

Data consumers are responsible for reader account setup and data usage costs.

D.

Data consumers are responsible for reader account setup and data usage costs.

Answers
E.

Reader accounts enable data consumers to access and query data shared by the provider.

E.

Reader accounts enable data consumers to access and query data shared by the provider.

Answers
Suggested answer: A, E

Explanation:

Characteristics of reader accounts in Snowflake include:

A . Reader account users cannot add new data to the account: Reader accounts are intended for data consumption only. Users of these accounts can query and analyze the data shared with them but cannot upload or add new data to the account.

E . Reader accounts enable data consumers to access and query data shared by the provider: One of the primary purposes of reader accounts is to allow data consumers to access and perform queries on the data shared by another Snowflake account, facilitating secure and controlled data sharing.

Snowflake Documentation: Reader Accounts

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

A.

Use the SECURITYADMIN role.

Answers
B.

Use the SYSADMIN role.

B.

Use the SYSADMIN role.

Answers
C.

Use the USERADMIN role.

C.

Use the USERADMIN role.

Answers
D.

Contact Snowflake Support.

D.

Contact Snowflake Support.

Answers
Suggested answer: C

Explanation:

To temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY, the USERADMIN role should be used. This role has the necessary privileges to modify user properties, including setting a temporary bypass for network policies, which can be crucial for enabling access under specific circumstances without permanently altering the network security configuration.

Snowflake Documentation: User Management

When using the ALLOW_CLINT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

A.

1 hour

Answers
B.

2 hours

B.

2 hours

Answers
C.

4 hours

C.

4 hours

Answers
D.

8 hours

D.

8 hours

Answers
Suggested answer: C

Explanation:

A cached MFA token is valid for up to four hours. https://docs.snowflake.com/en/user-guide/security-mfa#using-mfa-token-caching-to-minimize-the-number-of-prompts-during-authentication-optional

Which Snowflake edition offers the highest level of security for organizations that have the strictest requirements?

A.

Standard

A.

Standard

Answers
B.

Enterprise

B.

Enterprise

Answers
C.

Business Critical

C.

Business Critical

Answers
D.

Virtual Private Snowflake (VPS)

D.

Virtual Private Snowflake (VPS)

Answers
Suggested answer: D

Explanation:

The Virtual Private Snowflake (VPS) edition offers the highest level of security for organizations with the strictest security requirements. This edition provides a dedicated and isolated instance of Snowflake, including enhanced security features and compliance certifications to meet the needs of highly regulated industries or any organization requiring the utmost in data protection and privacy.

Snowflake Documentation: Snowflake Editions

A user wants to add additional privileges to the system-defined roles for their virtual warehouse. How does Snowflake recommend they accomplish this?

A.

Grant the additional privileges to a custom role.

A.

Grant the additional privileges to a custom role.

Answers
B.

Grant the additional privileges to the ACCOUNTADMIN role.

B.

Grant the additional privileges to the ACCOUNTADMIN role.

Answers
C.

Grant the additional privileges to the SYSADMIN role.

C.

Grant the additional privileges to the SYSADMIN role.

Answers
D.

Grant the additional privileges to the ORGADMIN role.

D.

Grant the additional privileges to the ORGADMIN role.

Answers
Suggested answer: A

Explanation:

Snowflake recommends enhancing the granularity and management of privileges by creating and utilizing custom roles. When additional privileges are needed beyond those provided by the system-defined roles for a virtual warehouse or any other resource, these privileges should be granted to a custom role. This approach allows for more precise control over access rights and the ability to tailor permissions to the specific needs of different user groups or applications within the organization, while also maintaining the integrity and security model of system-defined roles.

Snowflake Documentation: Roles and Privileges

Which function is used to convert rows in a relational table to a single VARIANT column?

A.

ARRAY_AGG

A.

ARRAY_AGG

Answers
B.

OBJECT_AGG

B.

OBJECT_AGG

Answers
C.

ARRAY_CONSTRUCT

C.

ARRAY_CONSTRUCT

Answers
D.

OBJECT_CONSTRUCT

D.

OBJECT_CONSTRUCT

Answers
Suggested answer: D

Explanation:

The OBJECT_CONSTRUCT function in Snowflake is used to convert rows in a relational table into a single VARIANT column that represents each row as a JSON object. This function dynamically creates a JSON object from a list of key-value pairs, where each key is a column name and each value is the corresponding column value for a row. This is particularly useful for aggregating and transforming structured data into semi-structured JSON format for further processing or analysis.

Snowflake Documentation: Semi-structured Data Functions

Which data formats are supported by Snowflake when unloading semi-structured data? (Select TWO).

A.

Binary file in Avro

A.

Binary file in Avro

Answers
B.

Binary file in Parquet

B.

Binary file in Parquet

Answers
C.

Comma-separated JSON

C.

Comma-separated JSON

Answers
D.

Newline Delimited JSON

D.

Newline Delimited JSON

Answers
E.

Plain text file containing XML elements

E.

Plain text file containing XML elements

Answers
Suggested answer: B, D

Explanation:

Snowflake supports a variety of file formats for unloading semi-structured data, among which Parquet and Newline Delimited JSON (NDJSON) are two widely used formats.

B . Binary file in Parquet: Parquet is a columnar storage file format optimized for large-scale data processing and analysis. It is especially suited for complex nested data structures.

D . Newline Delimited JSON (NDJSON): This format represents JSON records separated by newline characters, facilitating the storage and processing of multiple, separate JSON objects in a single file.

These formats are chosen for their efficiency and compatibility with data analytics tools and ecosystems, enabling seamless integration and processing of exported data.

Snowflake Documentation: Data Unloading

Which Snowflake layer is associated with virtual warehouses?

A.

Cloud services

A.

Cloud services

Answers
B.

Query processing

B.

Query processing

Answers
C.

Elastic memory

C.

Elastic memory

Answers
D.

Database storage

D.

Database storage

Answers
Suggested answer: B

Explanation:

The layer of Snowflake's architecture associated with virtual warehouses is the Query Processing layer. Virtual warehouses in Snowflake are dedicated compute clusters that execute SQL queries against the stored data. This layer is responsible for the entire query execution process, including parsing, optimization, and the actual computation. It operates independently of the storage layer, enabling Snowflake to scale compute and storage resources separately for efficiency and cost-effectiveness.

Snowflake Documentation: Snowflake Architecture

What is it called when a customer managed key is combined with a Snowflake managed key to create a composite key for encryption?

A.

Hierarchical key model

A.

Hierarchical key model

Answers
B.

Client-side encryption

B.

Client-side encryption

Answers
C.

Tri-secret secure encryption

C.

Tri-secret secure encryption

Answers
D.

Key pair authentication

D.

Key pair authentication

Answers
Suggested answer: C

Explanation:

Tri-secret secure encryption is a security model employed by Snowflake that involves combining a customer-managed key with a Snowflake-managed key to create a composite key for encrypting data. This model enhances data security by requiring both the customer-managed key and the Snowflake-managed key to decrypt data, thus ensuring that neither party can access the data independently. It represents a balanced approach to key management, leveraging both customer control and Snowflake's managed services for robust data encryption.

Snowflake Documentation: Encryption and Key Management

What should be used when creating a CSV file format where the columns are wrapped by single quotes or double quotes?

A.

BINARY_FORMAT

A.

BINARY_FORMAT

Answers
B.

ESCAPE_UNENCLOSED_FIELD

B.

ESCAPE_UNENCLOSED_FIELD

Answers
C.

FIELD_OPTIONALLY_ENCLOSED_BY

C.

FIELD_OPTIONALLY_ENCLOSED_BY

Answers
D.

SKIP BYTE ORDER MARK

D.

SKIP BYTE ORDER MARK

Answers
Suggested answer: C

Explanation:

When creating a CSV file format in Snowflake and the requirement is to wrap columns by single quotes or double quotes, the FIELD_OPTIONALLY_ENCLOSED_BY parameter should be used in the file format specification. This parameter allows you to define a character (either a single quote or a double quote) that can optionally enclose each field in the CSV file, providing flexibility in handling fields that contain special characters or delimiters as part of their data.

Snowflake Documentation: CSV File Format

Total 627 questions
Go to page: of 63