Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which privilege is required to use the search optimization service in Snowflake?

A.

GRANT SEARCH OPTIMIZATION ON SCHEMA TO ROLE

B.

GRANT SEARCH OPTIMIZATION ON DATABASE TO ROLE

C.

GRANT ADD SEARCH OPTIMIZATION ON SCHEMA TO ROLE

D.

GRANT ADD SEARCH OPTIMIZATION ON DATABASE TO ROLE

What criteria does Snowflake use to determine the current role when initiating a session? (Select TWO).

A.

If a role was specified as part of the connection and that role has been granted to the Snowflake user, the specified role becomes the current role.

B.

If no role was specified as part of the connection and a default role has been defined for the Snowflake user, that role becomes the current role.

C.

If no role was specified as part of the connection and a default role has not been set for the Snowflake user, the session will not be initiated and the log in will fail.

D.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, it will be ignored and the default role will become the current role.

E.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, the role is automatically granted and it becomes the current role.

What is the Fail-safe period for a transient table in the Snowflake Enterprise edition and higher?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

How are network policies defined in Snowflake?

A.

They are a set of rules that define the network routes within Snowflake.

B.

They are a set of rules that dictate how Snowflake accounts can be used between multiple users.

C.

They are a set of rules that define how data can be transferred between different Snowflake accounts within an organization.

D.

They are a set of rules that control access to Snowflake accounts by specifying the IP addresses or ranges of IP addresses that are allowed to connect

to Snowflake.

How long is a query visible in the Query History page in the Snowflake Web Interface (Ul)?

A.

60 minutes

B.

24 hours

C.

14 days

D.

30 days

When referring to User-Defined Function (UDF) names in Snowflake, what does the term overloading mean?

A.

There are multiple SOL UDFs with the same names and the same number of arguments.

B.

There are multiple SQL UDFs with the same names and the same number of argument types.

C.

There are multiple SQL UDFs with the same names but with a different number of arguments or argument types.

D.

There are multiple SQL UDFs with different names but the same number of arguments or argument types.

Which command removes a role from another role or a user in Snowflak?

A.

ALTER ROLE

B.

REVOKE ROLE

C.

USE ROLE

D.

USE SECONDARY ROLES

The effects of query pruning can be observed by evaluating which statistics? (Select TWO).

A.

Partitions scanned

B.

Partitions total

C.

Bytes scanned

D.

Bytes read from result

E.

Bytes written

If a virtual warehouse runs for 61 seconds, shut down, and then restart and runs for 30 seconds, for how many seconds is it billed?

A.

60

B.

91

C.

120

D.

121

Which function is used to convert rows in a relational table to a single VARIANT column?

A.

ARRAY_AGG

B.

OBJECT_AGG

C.

ARRAY_CONSTRUCT

D.

OBJECT_CONSTRUCT

What is the only supported character set for loading and unloading data from all supported file formats?

A.

UTF-8

B.

UTF-16

C.

ISO-8859-1

D.

WINDOWS-1253

What does the TableScan operator represent in the Query Profile?

A.

The access to a single table

B.

The access to data stored in stage objects

C.

The list of values provided with the VALUES clause

D.

The records generated using the TABLE (GENERATOR (...)) construct

Which SQL command can be used to verify the privileges that are granted to a role?

A.

SHOW GRANTS ON ROLE

B.

SHOW ROLES

C.

SHOW GRANTS TO ROLE

D.

SHOW GRANTS FOR ROLE

Which common query problems are identified by the Query Profile? (Select TWO.)

A.

Syntax error

B.

Inefficient pruning

C.

Ambiguous column names

D.

Queries too large to fit in memory

E.

Object does not exist or not authorized

What is it called when a customer managed key is combined with a Snowflake managed key to create a composite key for encryption?

A.

Hierarchical key model

B.

Client-side encryption

C.

Tri-secret secure encryption

D.

Key pair authentication

A Snowflake user is writing a User-Defined Function (UDF) that includes some unqualified object names.

How will those object names be resolved during execution?

A.

Snowflake will resolve them according to the SEARCH_PATH parameter.

B.

Snowflake will only check the schema the UDF belongs to.

C.

Snowflake will first check the current schema, and then the schema the previous query used

D.

Snowflake will first check the current schema, and them the PUBLIC schema of the current database.

Which service or feature in Snowflake is used to improve the performance of certain types of lookup and analytical queries that use an extensive set of WHERE conditions?

A.

Data classification

B.

Query acceleration service

C.

Search optimization service

D.

Tagging

What is the MAXIMUM number of clusters that can be provisioned with a multi-cluster virtual warehouse?

A.

1

B.

5

C.

10

D.

100

Which command can be used to list all the file formats for which a user has access privileges?

A.

LIST

B.

ALTER FILE FORMAT

C.

DESCRIBE FILE FORMAT

D.

SHOW FILE FORMATS

When floating-point number columns are unloaded to CSV or JSON files, Snowflake truncates the values to approximately what?

A.

(12,2)

B.

(10,4)

C.

(14,8)

D.

(15,9)