Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The property mins_to_bypass_network_policy is set at which level?

A.

User

B.

Role

C.

Account

D.

Organization

Which Snowflake table type is only visible to the user who creates it, can have the same name as permanent tables in the same schema, and is dropped at the end of the session?

A.

Temporary

B.

Local

C.

User

D.

Transient

What does Snowflake attempt to do if any of the compute resources for a virtual warehouse fail to provision during start-up?

A.

Repair the failed resources.

B.

Restart failed resources.

C.

Queue the failed resources

D.

Provision the failed resources

How does Snowflake define i1s approach to Discretionary Access Control (DAC)?

A.

A defined level of access to an object

B.

An entity in which access can be granted

C.

Each object has an owner, who can in turn grail access to that object.

D.

Access privileges are assigned to roles. which are in turn assigned to use's

Snowflake's access control framework combines which models for securing data? (Select TWO).

A.

Attribute-based Access Control (ABAC 1

B.

Discretionary Access Control (DAC)

C.

Access Control List (ACL)

D.

Role-based Access Control (RBAC)

E.

Rule-based Access Control (RuBAC)

A stream can be created on which Snowflake objects to record data manipulation language(DML) changes? (Select TWO).

A.

Database

B.

Standard tables

C.

Standard tables

D.

Standard views

E.

Schemas

F.

Pipes

How does the Access_History view enhance overall data governance pertaining to read and write operations? (Select TWO).

A.

Shows how the accessed data was moved from the source lo the target objects

B.

Provides a unified picture of what data was accessed and when it was accessed

C.

Protects sensitive data from unauthorized access while allowing authorized users to access it at query runtime

D.

Identifies columns with personal information and tags them so masking policies can be applied to protect sensitive data

E.

Determines whether a given row in a table can be accessed by the user by filtering the data based on a given policy

What can a user win a reader account do in Snowflake?

A.

Load now data

B.

Update existing data

C.

Create a new snare

D.

Query shared data

Which Snowflake feature records changes mace to a table so actions can be taken using that change data capture?

A.

Materialized View

B.

Pipe

C.

Stream

D.

Task

Which view in SNOWFLAKE.ACCOUNT_USAGE shows from which IP address a user connected to Snowflak?

A.

ACCESS_HOSTORY

B.

LOGIN_HISTORY

C.

SESSIONS

D.

QUERY HISTORY

Which object type is granted permissions for reading a table?

A.

User

B.

Role

C.

Attribute

D.

Schema

What does Snowflake recommend for a user assigned the ACCOUNTADMIN role?

A.

The ACCCUKTMKIN role should be set as tie user's default role.

B.

The user should use federated authentication instead of a password

C.

The user should be required to use Multi-Factor Authentication (MFA).

D.

There should be just one user with the ACCOUNTADMIN role in each Snowflake account.

Which file function provides a URL with access to a file on a stage without the need for authentication and authorization?

A.

GET_RELATIVE_PATH

B.

GET_PRESIGNED_URL

C.

BUILD_STAGE_FILE_URL

D.

BUILD_SCOPED_FILE_URL

In addition to performing all the standard steps to share data, which privilege must be granted on each database referenced by a secure view in order to be shared?

A.

READ

B.

REFERENCES

C.

REFERENCEJJSAGE

D.

USAGE

A Snowflake user wants to optimize performance for a query that queries only a small number of rows in a table. The rows require significant processing. The data in the table does not change frequently.

What should the user do?

A.

Add a clustering key to the table.

B.

Add the search optimization service to the table.

C.

Create a materialized view based on the query.

D.

Enable the query acceleration service for the virtual warehouse.