Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Snowflake SnowPro Core Certification COF-C02 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 81-100 out of questions
Questions # 81:

What COPY INTO SQL command should be used to unload data into multiple files?

Options:

A.

SINGLE=TRUE


B.

MULTIPLE=TRUE


C.

MULTIPLE=FALSE


D.

SINGLE=FALSE


Expert Solution
Questions # 82:

What type of query benefits the MOST from search optimization?

Options:

A.

A query that uses only disjunction (i.e., OR) predicates


B.

A query that includes analytical expressions


C.

A query that uses equality predicates or predicates that use IN


D.

A query that filters on semi-structured data types


Expert Solution
Questions # 83:

Which tasks are performed in the Snowflake Cloud Services layer? (Choose two.)

Options:

A.

Management of metadata


B.

Computing the data


C.

Maintaining Availability Zones


D.

Infrastructure security


E.

Parsing and optimizing queries


Expert Solution
Questions # 84:

Which snowflake objects will incur both storage and cloud compute charges? (Select TWO)

Options:

A.

Materialized view


B.

Sequence


C.

Secure view


D.

Transient table


E.

Clustered table


Expert Solution
Questions # 85:

A user is preparing to load data from an external stage

Which practice will provide the MOST efficient loading performance?

Options:

A.

Organize files into logical paths


B.

Store the files on the external stage to ensure caching is maintained


C.

Use pattern matching for regular expression execution


D.

Load the data in one large file


Expert Solution
Questions # 86:

Users are responsible for data storage costs until what occurs?

Options:

A.

Data expires from Time Travel


B.

Data expires from Fail-safe


C.

Data is deleted from a table


D.

Data is truncated from a table


Expert Solution
Questions # 87:

Why does Snowflake recommend file sizes of 100-250 MB compressed when loading data?

Options:

A.

Optimizes the virtual warehouse size and multi-cluster setting to economy mode


B.

Allows a user to import the files in a sequential order


C.

Increases the latency staging and accuracy when loading the data


D.

Allows optimization of parallel operations


Expert Solution
Questions # 88:

In a Snowflake role hierarchy, what is the top-level role?

Options:

A.

SYSADMIN


B.

ORGADMIN


C.

ACCOUNTADMIN


D.

SECURITYADMIN


Expert Solution
Questions # 89:

Which statements are correct concerning the leveraging of third-party data from the Snowflake Data Marketplace? (Choose two.)

Options:

A.

Data is live, ready-to-query, and can be personalized.


B.

Data needs to be loaded into a cloud provider as a consumer account.


C.

Data is not available for copying or moving to an individual Snowflake account.


D.

Data is available without copying or moving.


E.

Data transformations are required when combining Data Marketplace datasets with existing data in Snowflake.


Expert Solution
Questions # 90:

A user has unloaded data from a Snowflake table to an external stage.

Which command can be used to verify if data has been uploaded to the external stage named my_stage?

Options:

A.

view @my_stage


B.

list @my_stage


C.

show @my_stage


D.

display @my_stage


Expert Solution
Questions # 91:

If 3 size Small virtual warehouse is made up of two servers, how many servers make up a Large warehouse?

Options:

A.

4


B.

8


C.

16


D.

32


Expert Solution
Questions # 92:

What can be interpreted based on the number of nodes reported in a Query Profile?

Options:

A.

Query execution time


B.

Network bandwidth during query execution


C.

Data spillage


D.

Compute required for metadata management


Expert Solution
Questions # 93:

What is the MINIMUM edition of Snowflake that is required to use a SCIM security integration?

Options:

A.

Business Critical Edition


B.

Standard Edition


C.

Virtual Private Snowflake (VPS)


D.

Enterprise Edition


Expert Solution
Questions # 94:

Which MINIMUM set of privileges is required to temporarily bypass an active network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY?

Options:

A.

Only while in the ACCOUNTADMIH role


B.

Only while in the securityadmin role


C.

Only the role with the ownership privilege on the network policy


D.

Only Snowflake Support can set the value for this object property


Expert Solution
Questions # 95:

What is the MINIMUM size of a table for which Snowflake recommends considering adding a clustering key?

Options:

A.

1 Kilobyte (KB)


B.

1 Megabyte (MB)


C.

1 Gigabyte (GB)


D.

1 Terabyte (TB)


Expert Solution
Questions # 96:

Which Snowflake feature can be used to identify tables, views, and columns that contain sensitive information by assigning and querying metadata?

Options:

A.

Tags


B.

External Tokens


C.

Row Access Policies


D.

Tag-Based Masking Policies


Expert Solution
Questions # 97:

A Snowflake user is querying JSON data and all values in the result set are wrapped in quotes. Which step will unwrap the data from all the columns in the query results?

Options:

A.

Use the TRIM function to remove the quotes.


B.

Use the INSTR function to remove the quotes.


C.

Use the SUBSTRING function to select the values that are inside the quotes.


D.

Use the CAST function to convert the columns to the correct data type.


Expert Solution
Questions # 98:

What objects can be cloned within Snowflake? (Select TWO).

Options:

A.

Schemas


B.

Users


C.

External tables


D.

Internal named stages


E.

External named stages


Expert Solution
Questions # 99:

What will happen when the data retention period for an object is set to 0 days?

Options:

A.

Streams containing the object will become stale.


B.

Time Travel will be deactivated for the object.


C.

Data replication will be disabled for the object.


D.

Data sharing will be disabled for the object.


Expert Solution
Questions # 100:

Which feature of Snowflake's Continuous Data Protection (CDP) has associated costs?

Options:

A.

Fail-safe


B.

Network policies


C.

End-to-end encryption


D.

Multi-Factor Authentication (MFA)


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 81-100 out of questions