Pass the Snowflake SnowPro Core Certification SnowPro-Core Questions and answers with CertsForce

Viewing page 12 out of 13 pages
Viewing questions 166-180 out of questions
Questions # 166:

In the Snowflake access control model, which entity owns an object by default?

Options:

A.

The user who created the object


B.

The SYSADMIN role


C.

Ownership depends on the type of object


D.

The role used to create the object


Expert Solution
Questions # 167:

Which command can be used to load data files into a Snowflake stage?

Options:

A.

JOIN


B.

COPY INTO


C.

PUT


D.

GET


Expert Solution
Questions # 168:

What occurs when a pipe is recreated using the CREATE OR REPLACE PIPE command?

Options:

A.

The Pipe load history is reset to empty.


B.

The REFRESH command is executed.


C.

The stage will be purged.


D.

The destination table is truncated.


Expert Solution
Questions # 169:

Which of the following are characteristics of Snowflake virtual warehouses? (Choose two.)

Options:

A.

Auto-resume applies only to the last warehouse that was started in a multi-cluster warehouse.


B.

The ability to auto-suspend a warehouse is only available in the Enterprise edition or above.


C.

SnowSQL supports both a configuration file and a command line option for specifying a default warehouse.


D.

A user cannot specify a default warehouse when using the ODBC driver.


E.

The default virtual warehouse size can be changed at any time.


Expert Solution
Questions # 170:

Which command sets the Virtual Warehouse for a session?

Options:

A.

COPY WAREHOUSE FROM <>;


B.

SET WAREHOUSE = <>;


C.

USE WAREHOUSE <>;


D.

USE VIRTUAL_WAREHOUSE <>;


Expert Solution
Questions # 171:

Users are responsible for data storage costs until what occurs?

Options:

A.

Data expires from Time Travel


B.

Data expires from Fail-safe


C.

Data is deleted from a table


D.

Data is truncated from a table


Expert Solution
Questions # 172:

Which of the following describes a Snowflake stored procedure?

Options:

A.

They can be created as secure and hide the underlying metadata from the user.


B.

They can only access tables from a single database.


C.

They can contain only a single SQL statement.


D.

They can be created to run with a caller's rights or an owner's rights.


Expert Solution
Questions # 173:

Which of the following is a data tokenization integration partner?

Options:

A.

Protegrity


B.

Tableau


C.

DBeaver


D.

SAP


Expert Solution
Questions # 174:

What types of data listings are available in the Snowflake Data Marketplace? (Choose two.)

Options:

A.

Reader


B.

Consumer


C.

Vendor


D.

Standard


E.

Personalized


Expert Solution
Questions # 175:

A table needs to be loaded. The input data is in JSON format and is a concatenation of multiple JSON documents. The file size is 3 GB. A warehouse size small is being used. The following COPY INTO command was executed:

COPY INTO SAMPLE FROM @~/SAMPLE.JSON (TYPE=JSON)

The load failed with this error:

Max LOB size (16777216) exceeded, actual size of parsed column is 17894470.

How can this issue be resolved?

Options:

A.

Compress the file and load the compressed file.


B.

Split the file into multiple files in the recommended size range (100 MB - 250 MB).


C.

Use a larger-sized warehouse.


D.

Set STRIP_OUTER_ARRAY=TRUE in the COPY INTO command.


Expert Solution
Questions # 176:

A single user of a virtual warehouse has set the warehouse to auto-resume and auto-suspend after 10 minutes. The warehouse is currently suspended and the user performs the following actions:

1. Runs a query that takes 3 minutes to complete

2. Leaves for 15 minutes

3. Returns and runs a query that takes 10 seconds to complete

4. Manually suspends the warehouse as soon as the last query was completed

When the user returns, how much billable compute time will have been consumed?

Options:

A.

4 minutes


B.

10 minutes


C.

14 minutes


D.

24 minutes


Expert Solution
Questions # 177:

Which of the following are best practices for loading data into Snowflake? (Choose three.)

Options:

A.

Aim to produce data files that are between 100 MB and 250 MB in size, compressed.


B.

Load data from files in a cloud storage service in a different region or cloud platform from the service or region containing the Snowflake account, to save on cost.


C.

Enclose fields that contain delimiter characters in single or double quotes.


D.

Split large files into a greater number of smaller files to distribute the load among the compute resources in an active warehouse.


E.

When planning which warehouse(s) to use for data loading, start with the largest warehouse possible.


F.

Partition the staged data into large folders with random paths, allowing Snowflake to determine the best way to load each file.


Expert Solution
Questions # 178:

Which columns are part of the result set of the Snowflake LATERAL FLATTEN command? (Choose two.)

Options:

A.

CONTENT


B.

PATH


C.

BYTE_SIZE


D.

INDEX


E.

DATATYPE


Expert Solution
Questions # 179:

Which statements are true concerning Snowflake's underlying cloud infrastructure? (Select THREE),

Options:

A.

Snowflake data and services are deployed in a single availability zone within a cloud provider's region.


B.

Snowflake data and services are available in a single cloud provider and a single region, the use of multiple cloud providers is not supported.


C.

Snowflake can be deployed in a customer's private cloud using the customer's own compute and storage resources for Snowflake compute and storage


D.

Snowflake uses the core compute and storage services of each cloud provider for its own compute and storage


E.

All three layers of Snowflake's architecture (storage, compute, and cloud services) are deployed and managed entirely on a selected cloud platform


F.

Snowflake data and services are deployed in at least three availability zones within a cloud provider's region


Expert Solution
Questions # 180:

What features that are part of the Continuous Data Protection (CDP) feature set in Snowflake do not require additional configuration? (Choose two.)

Options:

A.

Row level access policies


B.

Data masking policies


C.

Data encryption


D.

Time Travel


E.

External tokenization


Expert Solution
Viewing page 12 out of 13 pages
Viewing questions 166-180 out of questions