- (Topic 6)What takes the highest precedence in Snowflake file format options, when specified in multiple locations during data loading?
Correct Answer: C When loading data into Snowflake, the file format options specified in theCOPY INTO <table>statement take the highest precedence over other locations such as the stage or table definitions. This ensures that any specific settings for a particular load operation are applied correctly.✑ File Format Hierarchy:✑ Example Usage: COPY INTO my_table FROM @my_stageFILE_FORMAT = (FORMAT_NAME = 'my_format' FIELD_OPTIONALLY_ENCLOSED_BY= '"');References:✑ Snowflake Documentation: Copy into Table✑ Snowflake Documentation: File Format Options
- (Topic 5)Which privilege is required to use the search optimization service in Snowflake?
Correct Answer: C To utilize the search optimization service in Snowflake, the correct syntax for granting privileges to a role involves specific commands that include adding search optimization capabilities:✑ Option C: GRANT ADD SEARCH OPTIMIZATION ON SCHEMA TO ROLE . This command grants the specified role the ability to implement search optimization at the schema level, which is essential for enhancing search capabilities within that schema.Options A and B do not include the correct verb "ADD," which is necessary for this specific type of grant command in Snowflake. Option D incorrectly mentions the database level, as search optimization privileges are typically configured at the schema level, not the database level.References:Snowflake documentation on the use of GRANT statements for configuring search optimization.
- (Topic 6)What is the purpose of the use of the VALIDATE command?
Correct Answer: D TheVALIDATEcommand in Snowflake is used to check for errors that occurred during the execution of aCOPY INTO <table>statement. This command helps users identify andresolve data loading issues.✑ Run the COPY INTO Statement:Execute theCOPY INTO command to load data from a stage into a table.COPY INTO my_table FROM @my_stageFILE_FORMAT = (FORMAT_NAME = 'my_format');✑ Validate the Load:Use theVALIDATEfunction to see if there were any errors during the data load.SELECT *FROM TABLE(VALIDATE(my_table, JOB_ID => 'my_copy_job_id'));✑ Review Errors:TheVALIDATEfunction will return details about any errors that occurred, such as parsing errors or data type mismatches.References:✑ Snowflake Documentation: Validating Data Loads✑ Snowflake Documentation: COPY INTO QUESTION 254 - (Topic 6)Which security models are used in Snowflake to manage access control? (Select TWO). A. Discretionary Access Control (DAC) B. Identity Access Management (1AM) C. Mandatory Access Control (MAC) D. Role-Based Access Control (RBAC) E. Security Assertion Markup Language (SAML) Reveal Solution Next Question Correct Answer: AD Snowflake uses both Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) to manage access control. DAC allows object owners to grant access privileges to other users. RBAC assigns permissions to roles, and roles are then granted to users, making it easier to manage permissions based on user roles within the organization.References:✑ Snowflake Documentation: Access Control in Snowflake QUESTION 255 - (Topic 3)At what levels can a resource monitor be configured? (Select TWO). A. Account B. Database C. Organization D. Schema E. Virtual warehouse Reveal Solution Next Question Correct Answer: AE Resource monitors in Snowflake can be configured at the account and virtual warehouse levels. They are used to track credit usage and control costs associated with running virtual warehouses. When certain thresholds are reached, resource monitors can trigger actions such as sending alerts or suspending warehouses to prevent excessive credit consumption. References: [COF-C02] SnowPro Core Certification Exam Study Guide 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 Want to Unlock All Questions for this Exam? 98.4% Pass Rate Full Exam Access Practice Test Use this for 1year and renew if you’re satisfied. $19.95 Practice, PDF Go to Shop
- (Topic 6)Which security models are used in Snowflake to manage access control? (Select TWO).
Correct Answer: AD Snowflake uses both Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) to manage access control. DAC allows object owners to grant access privileges to other users. RBAC assigns permissions to roles, and roles are then granted to users, making it easier to manage permissions based on user roles within the organization.References:✑ Snowflake Documentation: Access Control in Snowflake
- (Topic 3)At what levels can a resource monitor be configured? (Select TWO).
Correct Answer: AE Resource monitors in Snowflake can be configured at the account and virtual warehouse levels. They are used to track credit usage and control costs associated with running virtual warehouses. When certain thresholds are reached, resource monitors can trigger actions such as sending alerts or suspending warehouses to prevent excessive credit consumption. References: [COF-C02] SnowPro Core Certification Exam Study Guide
Use this for 1year and renew if you’re satisfied.