Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Snowflake COF-C02 - SnowPro Core Certification Exam

Page: 8 / 17
Total 1085 questions

Files have been uploaded to a Snowflake internal stage. The files now need to be deleted.

Which SQL command should be used to delete the files?

A.

PURGE

B.

MODIFY

C.

REMOVE

D.

DELETE

What COPY INTO SQL command should be used to unload data into multiple files?

A.

SINGLE=TRUE

B.

MULTIPLE=TRUE

C.

MULTIPLE=FALSE

D.

SINGLE=FALSE

A user created a transient table and made several changes to it over the course of several days. Three days after the table was created, the user would like to go back to the first version of the table.

How can this be accomplished?

A.

Use Time Travel, as long as DATA_RETENTION_TIME_IN_DAYS was set to at least 3 days.

B.

The transient table version cannot be retrieved after 24 hours.

C.

Contact Snowflake Support to have the data retrieved from Fail-safe storage.

D.

Use the FAIL_SAFE parameter for Time Travel to retrieve the data from Fail-safe storage.

Which statements are correct concerning the leveraging of third-party data from the Snowflake Data Marketplace? (Choose two.)

A.

Data is live, ready-to-query, and can be personalized.

B.

Data needs to be loaded into a cloud provider as a consumer account.

C.

Data is not available for copying or moving to an individual Snowflake account.

D.

Data is available without copying or moving.

E.

Data transformations are required when combining Data Marketplace datasets with existing data in Snowflake.

How many days is load history for Snowpipe retained?

A.

1 day

B.

7 days

C.

14 days

D.

64 days

Which statements are true concerning Snowflake ' s underlying cloud infrastructure? (Select THREE),

A.

Snowflake data and services are deployed in a single availability zone within a cloud provider ' s region.

B.

Snowflake data and services are available in a single cloud provider and a single region, the use of multiple cloud providers is not supported.

C.

Snowflake can be deployed in a customer ' s private cloud using the customer ' s own compute and storage resources for Snowflake compute and storage

D.

Snowflake uses the core compute and storage services of each cloud provider for its own compute and storage

E.

All three layers of Snowflake ' s architecture (storage, compute, and cloud services) are deployed and managed entirely on a selected cloud platform

F.

Snowflake data and services are deployed in at least three availability zones within a cloud provider ' s region

Which services does the Snowflake Cloud Services layer manage? (Choose two.)

A.

Compute resources

B.

Query execution

C.

Authentication

D.

Data storage

E.

Metadata

What impacts the credit consumption of maintaining a materialized view? (Choose two.)

A.

Whether or not it is also a secure view

B.

How often the underlying base table is queried

C.

How often the base table changes

D.

Whether the materialized view has a cluster key defined

E.

How often the materialized view is queried

What type of query benefits the MOST from search optimization?

A.

A query that uses only disjunction (i.e., OR) predicates

B.

A query that includes analytical expressions

C.

A query that uses equality predicates or predicates that use IN

D.

A query that filters on semi-structured data types

Which of the following statements apply to Snowflake in terms of security? (Choose two.)

A.

Snowflake leverages a Role-Based Access Control (RBAC) model.

B.

Snowflake requires a user to configure an IAM user to connect to the database.

C.

All data in Snowflake is encrypted.

D.

Snowflake can run within a user ' s own Virtual Private Cloud (VPC).

E.

All data in Snowflake is compressed.

Which Snowflake architectural layer is responsible for a query execution plan?

A.

Compute

B.

Data storage

C.

Cloud services

D.

Cloud provider

Which of the following is an example of an operation that can be completed without requiring compute, assuming no queries have been executed previously?

A.

SELECT SUM (ORDER_AMT) FROM SALES;

B.

SELECT AVG(ORDER_QTY) FROM SALES;

C.

SELECT MIN(ORDER_AMT) FROM SALES;

D.

SELECT ORDER_AMT * ORDER_QTY FROM SALES;

What versions of Snowflake should be used to manage compliance with Personal Identifiable Information (PII) requirements? (Choose two.)

A.

Custom Edition

B.

Virtual Private Snowflake

C.

Business Critical Edition

D.

Standard Edition

E.

Enterprise Edition

Which file formats are supported for unloading data from Snowflake? (Choose two.)

A.

Avro

B.

JSON

C.

ORC

D.

XML

E.

Delimited (CSV, TSV, etc.)

What are best practice recommendations for using the ACCOUNTADMIN system-defined role in Snowflake? (Choose two.)

A.

Ensure all ACCOUNTADMIN roles use Multi-factor Authentication (MFA).

B.

All users granted ACCOUNTADMIN role must be owned by the ACCOUNTADMIN role.

C.

The ACCOUNTADMIN role must be granted to only one user.

D.

Assign the ACCOUNTADMIN role to at least two users, but as few as possible.

E.

All users granted ACCOUNTADMIN role must also be granted SECURITYADMIN role.

A user is preparing to load data from an external stage

Which practice will provide the MOST efficient loading performance?

A.

Organize files into logical paths

B.

Store the files on the external stage to ensure caching is maintained

C.

Use pattern matching for regular expression execution

D.

Load the data in one large file

Which Snowflake feature allows a user to substitute a randomly generated identifier for sensitive data, in order to prevent unauthorized users access to the data, before loading it into Snowflake?

A.

External Tokenization

B.

External Tables

C.

Materialized Views

D.

User-Defined Table Functions (UDTF)

Which command sets the Virtual Warehouse for a session?

A.

COPY WAREHOUSE FROM < < config file > > ;

B.

SET WAREHOUSE = < < warehouse name > > ;

C.

USE WAREHOUSE < < warehouse name > > ;

D.

USE VIRTUAL_WAREHOUSE < < warehouse name > > ;

A company needs to allow some users to see Personally Identifiable Information (PII) while limiting other users from seeing the full value of the PII.

Which Snowflake feature will support this?

A.

Row access policies

B.

Data masking policies

C.

Data encryption

D.

Role based access control

Which of the following objects are contained within a schema? (Choose two.)

A.

Role

B.

Stream

C.

Warehouse

D.

External table

E.

User

F.

Share