COF-C02 Dumps

COF-C02 Free Practice Test

Snowflake COF-C02: SnowPro Core Certification Exam (COF-C02)

QUESTION 256

- (Topic 3)
By definition, a secure view is exposed only to users with what privilege?

Correct Answer: B
A secure view in Snowflake is exposed only to users with the OWNERSHIP privilege. This privilege ensures that only authorized users who own the view, or roles that include ownership, can access the secure view

QUESTION 257

- (Topic 3)
Which statements reflect key functionalities of a Snowflake Data Exchange? (Choose two.)

Correct Answer: BE
A Snowflake Data Exchange allows groups of accounts to share data privately among the accounts (B), and it supports bidirectional sharing, meaning an account can be both a provider and a consumer of data (E). This facilitates secure and governed data collaboration within a selected group3.

QUESTION 258

- (Topic 6)
If a virtual warehouse is suspended, what happens to the warehouse cache?

Correct Answer: A
When a virtual warehouse in Snowflake is suspended,the cache is dropped and is no longer available upon restart. This means that all cached data, including results and temporary data, are cleared from memory. The purpose of this behavior is to conserve resources while the warehouse is not active. Upon restarting the warehouse, it will need to reload any data required for queries from storage, which may result in a slower initial performance until the cache is repopulated. This is a critical consideration for managing performance and cost in Snowflake.

QUESTION 259

- (Topic 4)
Who can activate and enforce a network policy for all users in a Snowflake account? (Select TWO).

Correct Answer: BE
In Snowflake, a user with the SECURITYADMIN role or higher can activate and enforce a network policy for all users in an account. Additionally, a role that has ownership of the network policy can also activate and enforce it

QUESTION 260

- (Topic 3)
What does Snowflake recommend regarding database object ownership? (Select TWO).

Correct Answer: BD
Snowflake recommends creating objects with a role that has the necessary privileges and is not overly permissive. SYSADMIN is typically used for managing system- level objects and operations. Creating objects with a custom role and granting this role to SYSADMIN allows for more granular control and adherence to the principle of least privilege. References: Based on best practices for database object ownership and role management.