- (Topic 6)
Which statements reflect valid commands when using secondary roles? (Select TWO).
Correct Answer:
CE
✑ Incorrect Commands:The options referencing "RESUME", "SUSPEND", and "ADD" are not valid commands in the context of secondary roles.
References:
✑ Snowflake Documentation (USE SECONDARY
ROLES): https://docs.snowflake.com/en/sql-reference/sql/use-secondary- roles.html
- (Topic 2)
The Snowflake cloud services layer is responsible for which tasks? (Choose two.)
Correct Answer:
BC
The Snowflake cloud services layer is responsible for tasks such as authentication and access control, ensuring secure access to the platform, and metadata management, which involves organizing and maintaining information about the data stored in Snowflake56.
- (Topic 2)
What type of query benefits the MOST from search optimization?
Correct Answer:
C
Search optimization in Snowflake is designed to improve the performance of queries that are selective and involve point lookup operations using equality and IN predicates. It is particularly beneficial for queries that access columns with a high number of distinct values1.
References = [COF-C02] SnowPro Core Certification Exam Study Guide, Snowflake Documentation
- (Topic 2)
Which of the following significantly improves the performance of selective point lookup queries on a table?
Correct Answer:
D
The Search Optimization Service significantly improves the performance of selective point lookup queries on tables by creating and maintaining a persistent data structure called a search access path, which allows some micro-partitions to be skipped when scanning the table
- (Topic 2)
Which Snowflake feature allows a user to substitute a randomly generated identifier for sensitive data, in order to prevent unauthorized users access to the data, before loading it into Snowflake?
Correct Answer:
A
The feature in Snowflake that allows a user to substitute a randomly generated identifier for sensitive data before loading it into Snowflake is known as External Tokenization. This process helps to secure sensitive data by ensuring that it is not exposed in its original form, thus preventing unauthorized access3.