Pass the Snowflake SnowPro Advanced: Architect ARA-C01 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

A user has the appropriate privilege to see unmasked data in a column.

If the user loads this column data into another column that does not have a masking policy, what will occur?

Options:

A.

Unmasked data will be loaded in the new column.


B.

Masked data will be loaded into the new column.


C.

Unmasked data will be loaded into the new column but only users with the appropriate privileges will be able to see the unmasked data.


D.

Unmasked data will be loaded into the new column and no users will be able to see the unmasked data.


Expert Solution
Questions # 2:

Which of the below commands will use warehouse credits?

Options:

A.

SHOW TABLES LIKE 'SNOWFL%';


B.

SELECT MAX(FLAKE_ID) FROM SNOWFLAKE;


C.

SELECT COUNT(*) FROM SNOWFLAKE;


D.

SELECT COUNT(FLAKE_ID) FROM SNOWFLAKE GROUP BY FLAKE_ID;


Expert Solution
Questions # 3:

The following table exists in the production database:

A regulatory requirement states that the company must mask the username for events that are older than six months based on the current date when the data is queried.

How can the requirement be met without duplicating the event data and making sure it is applied when creating views using the table or cloning the table?

Options:

A.

Use a masking policy on the username column using a entitlement table with valid dates.


B.

Use a row level policy on the user_events table using a entitlement table with valid dates.


C.

Use a masking policy on the username column with event_timestamp as a conditional column.


D.

Use a secure view on the user_events table using a case statement on the username column.


Expert Solution
Questions # 4:

How do Snowflake databases that are created from shares differ from standard databases that are not created from shares? (Choose three.)

Options:

A.

Shared databases are read-only.


B.

Shared databases must be refreshed in order for new data to be visible.


C.

Shared databases cannot be cloned.


D.

Shared databases are not supported by Time Travel.


E.

Shared databases will have the PUBLIC or INFORMATION_SCHEMA schemas without explicitly granting these schemas to the share.


F.

Shared databases can also be created as transient databases.


Expert Solution
Questions # 5:

Question # 5

Based on the architecture in the image, how can the data from DB1 be copied into TBL2? (Select TWO).

A)

Question # 5

B)

Question # 5

C)

Question # 5

D)

Question # 5

E)

Question # 5

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


E.

Option E


Expert Solution
Questions # 6:

A Snowflake Architect created a new data share and would like to verify that only specific records in secure views are visible within the data share by the consumers.

What is the recommended way to validate data accessibility by the consumers?

Options:

A.

Create reader accounts as shown below and impersonate the consumers by logging in with their credentials.create managed account reader_acctl admin_name = userl , adroin_password ■ 'Sdfed43da!44T , type = reader;


B.

Create a row access policy as shown below and assign it to the data share.create or replace row access policy rap_acct as (acct_id varchar) returns boolean -> case when 'acctl_role' = current_role() then true else false end;


C.

Set the session parameter called SIMULATED_DATA_SHARING_C0NSUMER as shown below in order to impersonate the consumer accounts.alter session set simulated_data_sharing_consumer - 'Consumer Acctl*


D.

Alter the share settings as shown below, in order to impersonate a specific consumer account.alter share sales share set accounts = 'Consumerl’ share restrictions = true


Expert Solution
Questions # 7:

A Snowflake Architect is designing a multi-tenant application strategy for an organization in the Snowflake Data Cloud and is considering using an Account Per Tenant strategy.

Which requirements will be addressed with this approach? (Choose two.)

Options:

A.

There needs to be fewer objects per tenant.


B.

Security and Role-Based Access Control (RBAC) policies must be simple to configure.


C.

Compute costs must be optimized.


D.

Tenant data shape may be unique per tenant.


E.

Storage costs must be optimized.


Expert Solution
Questions # 8:

An Architect needs to design a solution for building environments for development, test, and pre-production, all located in a single Snowflake account. The environments should be based on production data.

Which solution would be MOST cost-effective and performant?

Options:

A.

Use zero-copy cloning into transient tables.


B.

Use zero-copy cloning into permanent tables.


C.

Use CREATE TABLE ... AS SELECT (CTAS) statements.


D.

Use a Snowflake task to trigger a stored procedure to copy data.


Expert Solution
Questions # 9:

When activating Tri-Secret Secure in a hierarchical encryption model in a Snowflake account, at what level is the customer-managed key used?

Question # 9

Options:

A.

At the root level (HSM)


B.

At the account level (AMK)


C.

At the table level (TMK)


D.

At the micro-partition level


Expert Solution
Questions # 10:

Which steps are recommended best practices for prioritizing cluster keys in Snowflake? (Choose two.)

Options:

A.

Choose columns that are frequently used in join predicates.


B.

Choose lower cardinality columns to support clustering keys and cost effectiveness.


C.

Choose TIMESTAMP columns with nanoseconds for the highest number of unique rows.


D.

Choose cluster columns that are most actively used in selective filters.


E.

Choose cluster columns that are actively used in the GROUP BY clauses.


Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions