Snowflake SnowPro Core Practice Test - Questions Answers, Page 58
List of questions
Related questions
At what level is the MIN_DATA_RETENSION_TIME_IN_DAYS parameter set?
Account
Database
Schema
Table
What is the MINIMUM size of a table for which Snowflake recommends considering adding a clustering key?
1 Kilobyte (KB)
1 Megabyte (MB)
1 Gigabyte (GB)
1 Terabyte (TB)
Which types of subqueries does Snowflake support? (Select TWO).
Uncorrelated scalar subqueries in WHERE clauses
Uncorrelated scalar subqueries in any place that a value expression can be used
EXISTS, ANY / ALL, and IN subqueries in WHERE clauses: these subqueries can be uncorrelated only
EXISTS, ANY / ALL, and IN subqueries in where clauses: these subqueries can be correlated only
EXISTS, ANY /ALL, and IN subqueries in WHERE clauses: these subqueries can be correlated or uncorrelated
Which Snowflake data governance feature can support auditing when a user query reads column data?
Access History
Data classification
Column-level security
Object dependencies
A clustering key was defined on a table, but It is no longer needed. How can the key be removed?
ALTER TABLE <TABLE NAME> PURGE CLUSTERING KEY
ALTER TABLE <TABLE NAME> DELETE CLUSTERING KEY
ALTER TABLE <TABLE NAME> DROP CLUSTERING KEY
ALTER TABLE <TABLE NAME> REMOVE CLUSTERING KEY
What are characteristics of Snowflake network policies? (Select TWO).
They can be set for any Snowflake Edition.
They can be applied to roles.
They restrict or enable access to specific IP addresses.
They are activated using ALTER DATABASE SQL commands.
They can only be managed using the ORGADMIN role.
Which categories are included in the execution time summary in a Query Profile? (Select TWO).
Pruning
Spilling
Initialization
Local Disk I/O
Percentage of data read from cache
Which command can be used to list all network policies available in an account?
DESCRIBE SESSION POLICY
DESCRIBE NETWORK POLICY
SHOW SESSION POLICIES
SHOW NETWORK POLICIES
What should be considered when deciding to use a secure view? (Select TWO).
No details of the query execution plan will be available in the query profiler.
Once created there is no way to determine if a view is secure or not.
Secure views do not take advantage of the same internal optimizations as standard views.
It is not possible to create secure materialized views.
The view definition of a secure view is still visible to users by way of the information schema.
Which virtual warehouse consideration can help lower compute resource credit consumption?
Setting up a multi-cluster virtual warehouse
Resizing the virtual warehouse to a larger size
Automating the virtual warehouse suspension and resumption settings
Increasing the maximum cluster count parameter for a multi-cluster virtual warehouse
Question