Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

SnowPro-Core Questions and Answers

Question # 6

Which of the following can be used when unloading data from Snowflake? (Choose two.)

A.

When unloading semi-structured data, it is recommended that the STRIP_OUTER_ARRAY option be used.

B.

Use the ENCODING file format option to change the encoding from the default UTF-8.

C.

The OBJECT_CONSTRUCT function can be used to convert relational data to semi-structured data.

D.

By using the SINGLE = TRUE parameter, a single file up to 5 GB in size can be exported to the storage layer.

E.

Use the PARSE_JSON function to ensure structured data will be unloaded into the VARIANT data type.

Full Access
Question # 7

Which pages are included in the Activity area of Snowsight? (Select TWO).

A.

Contacts

B.

Sharing settings

C.

Copy History

D.

Query History

E.

Automatic Clustering History

Full Access
Question # 8

What can a Snowflake user do in the Activity section in Snowsight?

A.

Create dashboards.

B.

Write and run SQL queries.

C.

Explore databases and objects.

D.

Explore executed query performance.

Full Access
Question # 9

What is the MINIMUM Snowflake edition required to use the periodic rekeying of micro-partitions?

A.

Enterprise

B.

Business Critical

C.

Standard

D.

Virtual Private Snowflake

Full Access
Question # 10

Which statement MOST accurately describes clustering in Snowflake?

A.

The database ACCOUNTADMIN must define the clustering methodology for each Snowflake table.

B.

Clustering is the way data is grouped together and stored within Snowflake micro-partitions.

C.

The clustering key must be included in the COPY command when loading data into Snowflake.

D.

Clustering can be disabled within a Snowflake account.

Full Access
Question # 11

What is used to diagnose and troubleshoot network connections to Snowflake?

A.

SnowCD

B.

Snowpark

C.

Snowsight

D.

SnowSQL

Full Access
Question # 12

Where is Snowflake metadata stored?

A.

Within the data files

B.

In the virtual warehouse layer

C.

In the cloud services layer

D.

In the remote storage layer

Full Access
Question # 13

Network policies can be applied to which of the following Snowflake objects? (Choose two.)

A.

Roles

B.

Databases

C.

Warehouses

D.

Users

E.

Accounts

Full Access
Question # 14

Which query contains a Snowflake hosted file URL in a directory table for a stage named bronzestage?

A.

list @bronzestage;

B.

select * from directory(@bronzestage);

C.

select metadata$filename from @bronzestage;

D.

select * from table(information_schema.stage_directory_file_registration_history(

stage name=>'bronzestage1));

Full Access
Question # 15

Which of the following are characteristics of security in Snowflake?

A.

Account and user authentication is only available with the Snowflake Business Critical edition.

B.

Support for HIPAA and GDPR compliance is available for UI Snowflake editions.

C.

Periodic rekeying of encrypted data is available with the Snowflake Enterprise edition and higher

D.

Private communication to internal stages is allowed in the Snowflake Enterprise edition and higher.

Full Access
Question # 16

How does Snowflake recommend handling the bulk loading of data batches from files already available in cloud storage?

A.

Use Snowpipe.

B.

Use the INSERT command.

C.

Use an external table.

D.

Use the COPY command.

Full Access
Question # 17

Which Snowflake object can be accessed in he FROM clause of a query, returning a set of rows having one or more columns?

A.

A User-Defined Table Function (UDTF)

B.

A Scalar User Function (UDF)

C.

A stored procedure

D.

A task

Full Access
Question # 18

What is a responsibility of Snowflake’s virtual warehouses?

A.

Infrastructure management

B.

Metadata management

C.

Query execution

D.

Query parsing and optimization

E.

Permanent storage of micro-partitions

Full Access
Question # 19

A data provider wants to share data with a consumer who does not have a Snowflake account. The provider creates a reader account for the consumer following these steps:

1. Created a user called "CONSUMER"

2. Created a database to hold the share and an extra-small warehouse to query the data

3. Granted the role PUBLIC the following privileges: Usage on the warehouse, database, and schema, and SELECT on all the objects in the share

Based on this configuration what is true of the reader account?

A.

The reader account will automatically use the Standard edition of Snowflake.

B.

The reader account compute will be billed to the provider account.

C.

The reader account can clone data the provider has shared, but cannot re-share it.

D.

The reader account can create a copy of the shared data using CREATE TABLE AS...

Full Access
Question # 20

What happens to the shared objects for users in a consumer account from a share, once a database has been created in that account?

A.

The shared objects are transferred.

B.

The shared objects are copied.

C.

The shared objects become accessible.

D.

The shared objects can be re-shared.

Full Access
Question # 21

What file formats does Snowflake support for loading semi-structured data? (Choose three.)

A.

TSV

B.

JSON

C.

PDF

D.

Avro

E.

Parquet

F.

JPEG

Full Access
Question # 22

Which features could be used to improve the performance of queries that return a small subset of rows from a large table? (Select TWO).

A.

Search optimization service

B.

Automatic clustering

C.

Row access policies

D.

Multi-cluster virtual warehouses

E.

Secure views

Full Access
Question # 23

How can a Snowflake user optimize query performance in Snowflake? (Select TWO).

A.

Create a view.

B.

Cluster a table.

C.

Enable the search optimization service.

D.

Enable Time Travel.

E.

Index a table.

Full Access
Question # 24

What happens when a database is cloned?

A.

It does not retain any privileges granted on the source object.

B.

It replicates all granted privileges on the corresponding source objects.

C.

It replicates all granted privileges on the corresponding child objects.

D.

It replicates all granted privileges on the corresponding child schema objects.

Full Access
Question # 25

Which privilege must be granted to a share to allow secure views the ability to reference data in multiple databases?

A.

CREATE_SHARE on the account

B.

SHARE on databases and schemas

C.

SELECT on tables used by the secure view

D.

REFERENCE_USAGE on databases

Full Access
Question # 26

How does Snowflake allow a data provider with an Azure account in central Canada to share data with a data consumer on AWS in Australia?

A.

The data provider in Azure Central Canada can create a direct share to AWS Asia Pacific, if they are both in the same organization.

B.

The data consumer and data provider can form a Data Exchange within the same organization to create a share from Azure Central Canada to AWS Asia Pacific.

C.

The data provider uses the GET DATA workflow in the Snowflake Data Marketplace to create a share between Azure Central Canada and AWS Asia Pacific.

D.

The data provider must replicate the database to a secondary account in AWS Asia Pacific within the same organization then create a share to the data consumer's account.

Full Access
Question # 27

How long can a data consumer who has a pre-signed URL access data files using Snowflake?

A.

Indefinitely

B.

Until the result_cache expires

C.

Until the retention_time is met

D.

Until the expiration time is exceeded

Full Access
Question # 28

Which Snowflake objects can be shared with other Snowflake accounts? (Choose three.)

A.

Schemas

B.

Roles

C.

Secure Views

D.

Stored Procedures

E.

Tables

F.

Secure User-Defined Functions (UDFs)

Full Access
Question # 29

Which semi-structured data function interprets an input string as a JSON document that produces a VARIANT value?

A.

PARSE_JSON

B.

CHECK_JSON

C.

JSON_EXTRACT_PATH_TEXT

D.

PARSE_XML

Full Access
Question # 30

Which Snowflake edition enables data sharing only through Snowflake Support?

A.

Virtual Private Snowflake

B.

Business Critical

C.

Enterprise

D.

Standard

Full Access
Question # 31

Which stages are used with the Snowflake PUT command to upload files from a local file system? (Choose three.)

A.

Schema Stage

B.

User Stage

C.

Database Stage

D.

Table Stage

E.

External Named Stage

F.

Internal Named Stage

Full Access
Question # 32

In which Snowflake layer does Snowflake reorganize data into its internal optimized, compressed, columnar format?

A.

Cloud Services

B.

Database Storage

C.

Query Processing

D.

Metadata Management

Full Access
Question # 33

Which of the following is a data tokenization integration partner?

A.

Protegrity

B.

Tableau

C.

DBeaver

D.

SAP

Full Access
Question # 34

How should a virtual warehouse be configured if a user wants to ensure that additional multi-clusters are resumed with no delay?

A.

Configure the warehouse to a size larger than generally required

B.

Set the minimum and maximum clusters to autoscale

C.

Use the standard warehouse scaling policy

D.

Use the economy warehouse scaling policy

Full Access
Question # 35

Which Snowflake SQL statement would be used to determine which users and roles have access to a role called MY_ROLE?

A.

SHOW GRANTS OF ROLE MY_ROLE

B.

SHOW GRANTS TO ROLE MY_ROLE

C.

SHOW GRANTS FOR ROLE MY_ROLE

D.

SHOW GRANTS ON ROLE MY_ROLE

Full Access
Question # 36

By default, which Snowflake role is required to create a share?

A.

ORGADMIN

B.

SECURITYADMIN

C.

SHAREADMIN

D.

ACCOUNTADMIN

Full Access
Question # 37

Which command sets the Virtual Warehouse for a session?

A.

COPY WAREHOUSE FROM <>;

B.

SET WAREHOUSE = <>;

C.

USE WAREHOUSE <>;

D.

USE VIRTUAL_WAREHOUSE <>;

Full Access
Question # 38

A Snowflake Administrator needs to ensure that sensitive corporate data in Snowflake tables is not visible to end users, but is partially visible to functional managers.

How can this requirement be met?

A.

Use data encryption.

B.

Use dynamic data masking.

C.

Use secure materialized views.

D.

Revoke all roles for functional managers and end users.

Full Access
Question # 39

Assume there is a table consisting of five micro-partitions with values ranging from A to Z.

Which diagram indicates a well-clustered table?

A.

B.

C.

D.

Full Access
Question # 40

What do the terms scale up and scale out refer to in Snowflake? (Choose two.)

A.

Scaling out adds clusters of the same size to a virtual warehouse to handle more concurrent queries.

B.

Scaling out adds clusters of varying sizes to a virtual warehouse.

C.

Scaling out adds additional database servers to an existing running cluster to handle more concurrent queries.

D.

Snowflake recommends using both scaling up and scaling out to handle more concurrent queries.

E.

Scaling up resizes a virtual warehouse so it can handle more complex workloads.

F.

Scaling up adds additional database servers to an existing running cluster to handle larger workloads.

Full Access
Question # 41

What happens to historical data when the retention period for an object ends?

A.

The data is cloned into a historical object.

B.

The data moves to Fail-safe

C.

Time Travel on the historical data is dropped.

D.

The object containing the historical data is dropped.

Full Access
Question # 42

What is the SNOWFLAKE.ACCOUNT_USAGE view that contains information about which objects were read by queries within the last 365 days (1 year)?

A.

VIEWS_HISTORY

B.

OBJECT_HISTORY

C.

ACCESS_HISTORY

D.

LOGIN_HISTORY

Full Access
Question # 43

Which tasks are performed in the Snowflake Cloud Services layer? (Choose two.)

A.

Management of metadata

B.

Computing the data

C.

Maintaining Availability Zones

D.

Infrastructure security

E.

Parsing and optimizing queries

Full Access
Question # 44

Which snowflake objects will incur both storage and cloud compute charges? (Select TWO)

A.

Materialized view

B.

Sequence

C.

Secure view

D.

Transient table

E.

Clustered table

Full Access
Question # 45

What types of data listings are available in the Snowflake Data Marketplace? (Choose two.)

A.

Reader

B.

Consumer

C.

Vendor

D.

Standard

E.

Personalized

Full Access
Question # 46

What COPY INTO SQL command should be used to unload data into multiple files?

A.

SINGLE=TRUE

B.

MULTIPLE=TRUE

C.

MULTIPLE=FALSE

D.

SINGLE=FALSE

Full Access
Question # 47

What features that are part of the Continuous Data Protection (CDP) feature set in Snowflake do not require additional configuration? (Choose two.)

A.

Row level access policies

B.

Data masking policies

C.

Data encryption

D.

Time Travel

E.

External tokenization

Full Access
Question # 48

Snowflake supports the use of external stages with which cloud platforms? (Choose three.)

A.

Amazon Web Services

B.

Docker

C.

IBM Cloud

D.

Microsoft Azure Cloud

E.

Google Cloud Platform

F.

Oracle Cloud

Full Access
Question # 49

A virtual warehouse is created using the following command:

Create warehouse my_WH with

warehouse_size = MEDIUM

min_cluster_count = 1

max_cluster_count = 1

auto_suspend = 60

auto_resume = true;

The image below is a graphical representation of the warehouse utilization across two days.

What action should be taken to address this situation?

A.

Increase the warehouse size from Medium to 2XL.

B.

Increase the value for the parameter MAX_CONCURRENCY_LEVEL.

C.

Configure the warehouse to a multi-cluster warehouse.

D.

Lower the value of the parameter STATEMENT_QUEUED_TIMEOUT_IN_SECONDS.

Full Access
Question # 50

Which columns are part of the result set of the Snowflake LATERAL FLATTEN command? (Choose two.)

A.

CONTENT

B.

PATH

C.

BYTE_SIZE

D.

INDEX

E.

DATATYPE

Full Access
Question # 51

What is the MINIMUM edition of Snowflake that is required to use a SCIM security integration?

A.

Business Critical Edition

B.

Standard Edition

C.

Virtual Private Snowflake (VPS)

D.

Enterprise Edition

Full Access
Question # 52

What is the maximum Time Travel retention period for a temporary Snowflake table?

A.

90 days

B.

1 day

C.

7 days

D.

45 days

Full Access
Question # 53

If 3 size Small virtual warehouse is made up of two servers, how many servers make up a Large warehouse?

A.

4

B.

8

C.

16

D.

32

Full Access
Question # 54

A table needs to be loaded. The input data is in JSON format and is a concatenation of multiple JSON documents. The file size is 3 GB. A warehouse size small is being used. The following COPY INTO command was executed:

COPY INTO SAMPLE FROM @~/SAMPLE.JSON (TYPE=JSON)

The load failed with this error:

Max LOB size (16777216) exceeded, actual size of parsed column is 17894470.

How can this issue be resolved?

A.

Compress the file and load the compressed file.

B.

Split the file into multiple files in the recommended size range (100 MB - 250 MB).

C.

Use a larger-sized warehouse.

D.

Set STRIP_OUTER_ARRAY=TRUE in the COPY INTO command.

Full Access
Question # 55

How does Snowflake Fail-safe protect data in a permanent table?

A.

Fail-safe makes data available up to 1 day, recoverable by user operations.

B.

Fail-safe makes data available for 7 days, recoverable by user operations.

C.

Fail-safe makes data available for 7 days, recoverable only by Snowflake Support.

D.

Fail-safe makes data available up to 1 day, recoverable only by Snowflake Support.

Full Access
Question # 56

The Snowflake cloud services layer is responsible for which tasks? (Choose two.)

A.

Local disk caching

B.

Authentication and access control

C.

Metadata management

D.

Query processing

E.

Database storage

Full Access
Question # 57

Which of the following describes the Snowflake Cloud Services layer?

A.

Coordinates activities in the Snowflake account

B.

Executes queries submitted by the Snowflake account users

C.

Manages quotas on the Snowflake account storage

D.

Manages the virtual warehouse cache to speed up queries

Full Access
Question # 58

When cloning a database, what is cloned with the database? (Choose two.)

A.

Privileges on the database

B.

Existing child objects within the database

C.

Future child objects within the database

D.

Privileges on the schemas within the database

E.

Only schemas and tables within the database

Full Access
Question # 59

Which Snowflake function will interpret an input string as a JSON document, and produce a VARIANT value?

A.

parse_json()

B.

json_extract_path_text()

C.

object_construct()

D.

flatten

Full Access
Question # 60

Why does Snowflake recommend file sizes of 100-250 MB compressed when loading data?

A.

Optimizes the virtual warehouse size and multi-cluster setting to economy mode

B.

Allows a user to import the files in a sequential order

C.

Increases the latency staging and accuracy when loading the data

D.

Allows optimization of parallel operations

Full Access
Question # 61

A user has unloaded data from a Snowflake table to an external stage.

Which command can be used to verify if data has been uploaded to the external stage named my_stage?

A.

view @my_stage

B.

list @my_stage

C.

show @my_stage

D.

display @my_stage

Full Access
Question # 62

What are supported file formats for unloading data from Snowflake? (Choose three.)

A.

XML

B.

JSON

C.

Parquet

D.

ORC

E.

AVRO

F.

CSV

Full Access
Question # 63

Which of the following are best practices for loading data into Snowflake? (Choose three.)

A.

Aim to produce data files that are between 100 MB and 250 MB in size, compressed.

B.

Load data from files in a cloud storage service in a different region or cloud platform from the service or region containing the Snowflake account, to save on cost.

C.

Enclose fields that contain delimiter characters in single or double quotes.

D.

Split large files into a greater number of smaller files to distribute the load among the compute resources in an active warehouse.

E.

When planning which warehouse(s) to use for data loading, start with the largest warehouse possible.

F.

Partition the staged data into large folders with random paths, allowing Snowflake to determine the best way to load each file.

Full Access
Question # 64

What occurs when a pipe is recreated using the CREATE OR REPLACE PIPE command?

A.

The Pipe load history is reset to empty.

B.

The REFRESH command is executed.

C.

The stage will be purged.

D.

The destination table is truncated.

Full Access
Question # 65

Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).

A.

Bytes scanned

B.

Bytes written to result

C.

Partitions scanned

D.

Partitions total

E.

Percentage scanned from cache

Full Access
Question # 66

What feature of Snowflake Continuous Data Protection can be used for maintenance of historical data?

A.

Access control

B.

Fail-safe

C.

Network policies

D.

Time Travel

Full Access
Question # 67

When working with a managed access schema, who has the OWNERSHIP privilege of any tables added to the schema?

A.

The database owner

B.

The object owner

C.

The schema owner

D.

The Snowflake user's role

Full Access
Question # 68

Which Snowflake role can manage any object grant globally, including modifying and revoking grants?

A.

USERADMIN

B.

ORGADMIN

C.

SYSADMIN

D.

SECURITYADMIN

Full Access
Question # 69

What are key characteristics of virtual warehouses in Snowflake? (Select TWO).

A.

Warehouses that are multi-cluster can have nodes of different sizes.

B.

Warehouses can be started and stopped at any time.

C.

Warehouses can be resized at any time, even while running.

D.

Warehouses are billed on a per-minute usage basis.

E.

Warehouses can only be used for querying and cannot be used for data loading.

Full Access
Question # 70

Which commands can only be executed using SnowSQL? (Select TWO).

A.

COPY INTO

B.

GET

C.

LIST

D.

PUT

E.

REMOVE

Full Access
Question # 71

What does a masking policy consist of in Snowflake?

A.

A single data type, with one or more conditions, and one or more masking functions

B.

A single data type, with only one condition, and only one masking function

C.

Multiple data types, with only one condition, and one or more masking functions

D.

Multiple data types, with one or more conditions, and one or more masking functions

Full Access
Question # 72

How can a dropped internal stage be restored?

A.

Enable Time Travel.

B.

Clone the dropped stage.

C.

Execute the UNDROP command.

D.

Recreate the dropped stage.

Full Access
Question # 73

Which Snowflake command can be used to unload the result of a query to a single file?

A.

Use COPY INTO followed by a GET command to download the file.

B.

Use COPY INTO followed by a put command to download the file.

C.

Use COPY INTO with SINGLE = TRUE followed by a GET command to download the file.

D.

Use COPY INTO with SINGLE = TRUE followed by a PUT command to download the file.

Full Access
Question # 74

Which VALIDATION_MODE value will return the errors across the files specified in a COPY command, including files that were partially loaded during an earlier load?

A.

RETURN_-1_R0WS

B.

RETURN_n_ROWS

C.

RETURN_ERRORS

D.

RETURN ALL ERRORS

Full Access
Question # 75

A user wants to access files stored in a stage without authenticating into Snowflake. Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

Full Access
Question # 76

What is the purpose of a Query Profile?

A.

To profile how many times a particular query was executed and analyze its u^age statistics over time.

B.

To profile a particular query to understand the mechanics of the query, its behavior, and performance.

C.

To profile the user and/or executing role of a query and all privileges and policies applied on the objects within the query.

D.

To profile which queries are running in each warehouse and identify proper warehouse utilization and sizing for better performance and cost balancing.

Full Access
Question # 77

How can a Snowflake administrator determine which user has accessed a database object that contains sensitive information?

A.

Review the granted privileges to the database object.

B.

Review the row access policy for the database object.

C.

Query the ACCESS_HlSTORY view in the ACCOUNT_USAGE schema.

D.

Query the REPLICATION USAGE HISTORY view in the ORGANIZATION USAGE schema.

Full Access
Question # 78

While working with unstructured data, which file function generates a Snowflake-hosted file URL to a staged file using the stage name and relative file path as inputs?

A.

GET_PRESIGNED_URL

B.

GET_ABSOLUTE_PATH

C.

BUILD_STAGE_FILE_URL

D.

BUILD SCOPED FILE URL

Full Access
Question # 79

Which views are included in the DATA SHARING USAGE schema? (Select TWO).

A.

ACCESS_HISTORY

B.

DATA_TRANSFER_HISTORY

C.

WAREHOUSE_METERING_HISTORY

D.

MONETIZED_USAGE_DAILY

E.

LISTING TELEMETRY DAILY

Full Access
Question # 80

How can a Snowflake user traverse semi-structured data?

A.

Insert a colon (:) between the VARIANT column name and any first-level element.

B.

Insert a colon (:) between the VARIANT column name and any second-level element. C. Insert a double colon (: :) between the VARIANT column name and any first-level element.

C.

Insert a double colon (: :) between the VARIANT column name and any second-level element.

Full Access
Question # 81

What is a characteristic of materialized views in Snowflake?

A.

Materialized views do not allow joins.

B.

Clones of materialized views can be created directly by the user.

C.

Multiple tables can be joined in the underlying query of a materialized view.

D.

Aggregate functions can be used as window functions in materialized views.

Full Access
Question # 82

What metadata does Snowflake store for rows in micro-partitions? (Select TWO).

A.

Range of values

B.

Distinct values

C.

Index values

D.

Sorted values

E.

Null values

Full Access
Question # 83

Which type of loop requires a BREAK statement to stop executing?

A.

FOR

B.

LOOP

C.

REPEAT

D.

WHILE

Full Access
Question # 84

When using the ALLOW CLIENT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?

A.

1 hour

B.

2 hours

C.

4 hours

D.

8 hours

Full Access
Question # 85

Which privilege must be granted by one role to another role, and cannot be revoked?

A.

MONITOR

B.

OPERATE

C.

OWNERSHIP

D.

ALL

Full Access
Question # 86

A Snowflake account has activated federated authentication.

What will occur when a user with a password that was defined by Snowflake attempts to log in to Snowflake?

A.

The user will be unable to enter a password.

B.

The user will encounter an error, and will not be able to log in.

C.

The user will be able to log into Snowflake successfully.

D.

After entering the username and password, the user will be redirected to an Identity Provider (IdP) login page.

Full Access
Question # 87

Which Snowflake table objects can be shared with other accounts? (Select TWO).

A.

Temporary tables

B.

Permanent tables

C.

Transient tables

D.

External tables

E.

User-Defined Table Functions (UDTFs)

Full Access
Question # 88

What tasks can an account administrator perform in the Data Exchange? (Select TWO).

A.

Add and remove members.

B.

Delete data categories.

C.

Approve and deny listing approval requests.

D.

Transfer listing ownership.

E.

Transfer ownership of a provider profile.

Full Access
Question # 89

Which commands are restricted in owner's rights stored procedures? (Select TWO).

A.

SHOW

B.

MERGE

C.

INSERT

D.

DELETE

E.

DESCRIBE

Full Access
Question # 90

How can a Snowflake user validate data that is unloaded using the COPY INTO command?

A.

Load the data into a CSV file.

B.

Load the data into a relational table.

C.

Use the VALlDATlON_MODE - SQL statement.

D.

Use the validation mode = return rows statement.

Full Access
Question # 91

At what level is the MIN_DATA_RETENTION_TIME_IN_DAYS parameter set?

A.

Account

B.

Database

C.

Schema

D.

Table

Full Access
Question # 92

What objects in Snowflake are supported by Dynamic Data Masking? (Select TWO).'

A.

Views

B.

Materialized views

C.

Tables

D.

External tables

E.

Future grants

Full Access
Question # 93

How should clustering be used to optimize the performance of queries that run on a very large table?

A.

Manually re-cluster the table regularly.

B.

Choose one high cardinality column as the clustering key.

C.

Use the column that is most-frequently used in query select clauses as the clustering key.

D.

Assess the average table depth to identify how clustering is impacting the query.

Full Access
Question # 94

What is the purpose of the Snowflake SPLIT TO_TABLE function?

A.

To count the number of characters in a string

B.

To split a string into an array of sub-strings

C.

To split a string and flatten the results into rows

D.

To split a string and flatten the results into columns

Full Access
Question # 95

How is unstructured data retrieved from data storage?

A.

SQL functions like the GET command can be used to copy the unstructured data to a location on the client.

B.

SQL functions can be used to create different types of URLs pointing to the unstructured data. These URLs can be used to download the data to a client.

C.

SQL functions can be used to retrieve the data from the query results cache. When the query results are output to a client, the unstructured data will be output to the client as files.

D.

SQL functions can call on different web extensions designed to display different types of files as a web page. The web extensions will allow the files to be downloaded to the client.

Full Access
Question # 96

What function can be used with the recursive argument to return a list of distinct key names in all nested elements in an object?

A.

FLATTEN

B.

GET_PATH

C.

CHECK_JSON

D.

PARSE JSON

Full Access
Question # 97

Which command is used to unload data from a Snowflake table into a file in a stage?

A.

COPY INTO

B.

GET

C.

WRITE

D.

EXTRACT INTO

Full Access
Question # 98

Which of the following conditions must be met in order to return results from the results cache? (Select TWO).

A.

The user has the appropriate privileges on the objects associated with the query

B.

Micro-partitions have been reclustered since the query was last run

C.

The new query is run using the same virtual warehouse as the previous query

D.

The query includes a User Defined Function (UDF)

E.

The query has been run within 24 hours of the previously-run query

Full Access
Question # 99

Query compilation occurs in which architecture layer of the Snowflake Cloud Data Platform?

A.

Compute layer

B.

Storage layer

C.

Cloud infrastructure layer

D.

Cloud services layer

Full Access
Question # 100

What are two ways to create and manage Data Shares in Snowflake? (Choose two.)

A.

Via the Snowflake Web Interface (Ul)

B.

Via the data_share=true parameter

C.

Via SQL commands

D.

Via Virtual Warehouses

Full Access
Question # 101

What Snowflake features allow virtual warehouses to handle high concurrency workloads? (Select TWO)

A.

The ability to scale up warehouses

B.

The use of warehouse auto scaling

C.

The ability to resize warehouses

D.

Use of multi-clustered warehouses

E.

The use of warehouse indexing

Full Access
Question # 102

What Snowflake role must be granted for a user to create and manage accounts?

A.

ACCOUNTADMIN

B.

ORGADMIN

C.

SECURITYADMIN

D.

SYSADMIN

Full Access
Question # 103

What tasks can be completed using the copy command? (Select TWO)

A.

Columns can be aggregated

B.

Columns can be joined with an existing table

C.

Columns can be reordered

D.

Columns can be omitted

E.

Data can be loaded without the need to spin up a virtual warehouse

Full Access
Question # 104

A user has an application that writes a new Tile to a cloud storage location every 5 minutes.

What would be the MOST efficient way to get the files into Snowflake?

A.

Create a task that runs a copy into operation from an external stage every 5 minutes

B.

Create a task that puts the files in an internal stage and automate the data loading wizard

C.

Create a task that runs a GET operation to intermittently check for new files

D.

Set up cloud provider notifications on the Tile location and use Snowpipe with auto-ingest

Full Access
Question # 105

A sales table FCT_SALES has 100 million records.

The following Query was executed

SELECT COUNT (1) FROM FCT__SALES;

How did Snowflake fulfill this query?

A.

Query against the result set cache

B.

Query against a virtual warehouse cache

C.

Query against the most-recently created micro-partition

D.

Query against the metadata excite

Full Access
Question # 106

Which of the following are benefits of micro-partitioning? (Select TWO)

A.

Micro-partitions cannot overlap in their range of values

B.

Micro-partitions are immutable objects that support the use of Time Travel.

C.

Micro-partitions can reduce the amount of I/O from object storage to virtual warehouses

D.

Rows are automatically stored in sorted order within micro-partitions

E.

Micro-partitions can be defined on a schema-by-schema basis

Full Access
Question # 107

What is a limitation of a Materialized View?

A.

A Materialized View cannot support any aggregate functions

B.

A Materialized View can only reference up to two tables

C.

A Materialized View cannot be joined with other tables

D.

A Materialized View cannot be defined with a JOIN

Full Access
Question # 108

What is the MOST performant file format for loading data in Snowflake?

A.

CSV (Unzipped)

B.

Parquet

C.

CSV (Gzipped)

D.

ORC

Full Access
Question # 109

Which of the following indicates that it may be appropriate to use a clustering key for a table? (Select TWO).

A.

The table contains a column that has very low cardinality

B.

DML statements that are being issued against the table are blocked

C.

The table has a small number of micro-partitions

D.

Queries on the table are running slower than expected

E.

The clustering depth for the table is large

Full Access
Question # 110

A user unloaded a Snowflake table called mytable to an internal stage called mystage.

Which command can be used to view the list of files that has been uploaded to the staged?

A.

list @mytable;

B.

list @%raytable;

C.

list @ %m.ystage;

D.

list @mystage;

Full Access
Question # 111

What is the default File Format used in the COPY command if one is not specified?

A.

CSV

B.

JSON

C.

Parquet

D.

XML

Full Access
Question # 112

Which of the following Snowflake objects can be shared using a secure share? (Select TWO).

A.

Materialized views

B.

Sequences

C.

Procedures

D.

Tables

E.

Secure User Defined Functions (UDFs)

Full Access
Question # 113

True or False: When you create a custom role, it is a best practice to immediately grant that role to ACCOUNTADMIN.

A.

True

B.

False

Full Access
Question # 114

What happens to the underlying table data when a CLUSTER BY clause is added to a Snowflake table?

A.

Data is hashed by the cluster key to facilitate fast searches for common data values

B.

Larger micro-partitions are created for common data values to reduce the number of partitions that must be scanned

C.

Smaller micro-partitions are created for common data values to allow for more parallelism

D.

Data may be colocated by the cluster key within the micro-partitions to improve pruning performance

Full Access
Question # 115

What is a key feature of Snowflake architecture?

A.

Zero-copy cloning creates a mirror copy of a database that updates with the original

B.

Software updates are automatically applied on a quarterly basis

C.

Snowflake eliminates resource contention with its virtual warehouse implementation

D.

Multi-cluster warehouses allow users to run a query that spans across multiple clusters

E.

Snowflake automatically sorts DATE columns during ingest for fast retrieval by date

Full Access
Question # 116

In which use cases does Snowflake apply egress charges?

A.

Data sharing within a specific region

B.

Query result retrieval

C.

Database replication

D.

Loading data into Snowflake

Full Access
Question # 117

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?

A.

The primary cluster in the virtual warehouse

B.

The entire virtual warehouse

C.

The database in which the virtual warehouse resides

D.

The Queries currently being run on the virtual warehouse

Full Access
Question # 118

Where would a Snowflake user find information about query activity from 90 days ago?

A.

account__usage . query history view

B.

account__usage.query__history__archive View

C.

information__schema . cruery_history view

D.

information__schema - query history_by_ses s i on view

Full Access
Question # 119

Which data type can be used to store geospatial data in Snowflake?

A.

Variant

B.

Object

C.

Geometry

D.

Geography

Full Access
Question # 120

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

A.

SCIM

B.

Federated authentication

C.

TLS 1.2

D.

Key-pair authentication

E.

OAuth

F.

OCSP authentication

Full Access
Question # 121

What happens when a virtual warehouse is resized?

A.

When increasing the size of an active warehouse the compute resource for all running and queued queries on the warehouse are affected

B.

When reducing the size of a warehouse the compute resources are removed only when they are no longer being used to execute any current statements.

C.

The warehouse will be suspended while the new compute resource is provisioned and will resume automatically once provisioning is complete.

D.

Users who are trying to use the warehouse will receive an error message until the resizing is complete

Full Access
Question # 122

What is a best practice after creating a custom role?

A.

Create the custom role using the SYSADMIN role.

B.

Assign the custom role to the SYSADMIN role

C.

Assign the custom role to the PUBLIC role

D.

Add__CUSTOM to all custom role names

Full Access
Question # 123

A developer is granted ownership of a table that has a masking policy. The developer's role is not able to see the masked data. Will the developer be able to modify the table to read the masked data?

A.

Yes, because a table owner has full control and can unset masking policies.

B.

Yes, because masking policies only apply to cloned tables.

C.

No, because masking policies must always reference specific access roles.

D.

No, because ownership of a table does not include the ability to change masking policies

Full Access
Question # 124

True or False: It is possible for a user to run a query against the query result cache without requiring an active Warehouse.

A.

True

B.

False

Full Access
Question # 125

User-level network policies can be created by which of the following roles? (Select TWO).

A.

ROLEADMIN

B.

ACCOUNTADMIN

C.

SYSADMIN

D.

SECURITYADMIN

E.

USERADMIN

Full Access
Question # 126

In the query profiler view for a query, which components represent areas that can be used to help optimize query performance? (Select TWO)

A.

Bytes scanned

B.

Bytes sent over the network

C.

Number of partitions scanned

D.

Percentage scanned from cache

E.

External bytes scanned

Full Access
Question # 127

What features does Snowflake Time Travel enable?

A.

Querying data-related objects that were created within the past 365 days

B.

Restoring data-related objects that have been deleted within the past 90 days

C.

Conducting point-in-time analysis for Bl reporting

D.

Analyzing data usage/manipulation over all periods of time

Full Access
Question # 128

Which is the MINIMUM required Snowflake edition that a user must have if they want to use AWS/Azure Privatelink or Google Cloud Private Service Connect?

A.

Standard

B.

Premium

C.

Enterprise

D.

Business Critical

Full Access