Pass the Snowflake SnowPro Core Certification SnowPro-Core Questions and answers with CertsForce

Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which operation can be performed on Snowflake external tables?

Options:

A.

INSERT


B.

JOIN


C.

RENAME


D.

ALTER


Expert Solution
Questions # 47:

Which Snowflake database object can be used to track data changes made to table data?

Options:

A.

Tag


B.

Task


C.

Stream


D.

Stored procedure


Expert Solution
Questions # 48:

What feature of Snowflake Continuous Data Protection can be used for maintenance of historical data?

Options:

A.

Access control


B.

Fail-safe


C.

Network policies


D.

Time Travel


Expert Solution
Questions # 49:

What is the purpose of a Query Profile?

Options:

A.

To profile how many times a particular query was executed and analyze its u^age statistics over time.


B.

To profile a particular query to understand the mechanics of the query, its behavior, and performance.


C.

To profile the user and/or executing role of a query and all privileges and policies applied on the objects within the query.


D.

To profile which queries are running in each warehouse and identify proper warehouse utilization and sizing for better performance and cost balancing.


Expert Solution
Questions # 50:

Which Snowflake object does not consume any storage costs?

Options:

A.

Secure view


B.

Materialized view


C.

Temporary table


D.

Transient table


Expert Solution
Questions # 51:

What are key characteristics of virtual warehouses in Snowflake? (Select TWO).

Options:

A.

Warehouses that are multi-cluster can have nodes of different sizes.


B.

Warehouses can be started and stopped at any time.


C.

Warehouses can be resized at any time, even while running.


D.

Warehouses are billed on a per-minute usage basis.


E.

Warehouses can only be used for querying and cannot be used for data loading.


Expert Solution
Questions # 52:

Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?

Options:

A.

OAuth


B.

Network policies


C.

Single Sign-On (SSO)


D.

Multi-Factor Authentication (MFA)


Expert Solution
Questions # 53:

Which metadata table will store the storage utilization information even for dropped tables?

Options:

A.

DATABASE_STORAGE_USAGE_HISTORY


B.

TABLE_STORAGE_METRICS


C.

STORAGE_DAILY_HISTORY


D.

STAGE STORAGE USAGE HISTORY


Expert Solution
Questions # 54:

What type of query will benefit from the query acceleration service?

Options:

A.

Queries without filters or aggregation


B.

Queries with large scans and selective filters


C.

Queries where the GROUP BY has high cardinality


D.

Queries of tables that have search optimization service enabled


Expert Solution
Questions # 55:

What information is found within the Statistic output in the Query Profile Overview?

Options:

A.

Operator tree


B.

Table pruning


C.

Most expensive nodes


D.

Nodes by execution time


Expert Solution
Questions # 56:

Which ACCOUNT_USAGE schema database role provides visibility into policy-related information?

Options:

A.

USAGE_VIEWER


B.

GOVERNANCE_VIEWER


C.

OBJECT_VIEWER


D.

SECURITY_VIEWER


Expert Solution
Questions # 57:

Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)

Options:

A.

INTEGER


B.

OBJECT


C.

VARIANT


D.

VARCHAR


E.

LIST


Expert Solution
Questions # 58:

Which command is used to start configuring Snowflake for Single Sign-On (SSO)?

Options:

A.

CREATE SESSION POLICY


B.

CREATE NETWORK RULE


C.

CREATE SECURITY INTEGRATION


D.

CREATE PASSWORD POLICY


Expert Solution
Questions # 59:

For which use cases is running a virtual warehouse required? (Select TWO).

Options:

A.

When creating a table


B.

When loading data into a table


C.

When unloading data from a table


D.

When executing a show command


E.

When executing a list command


Expert Solution
Questions # 60:

What will prevent unauthorized access to a Snowflake account from an unknown source?

Options:

A.

Network policy


B.

End-to-end encryption


C.

Multi-Factor Authentication (MFA)


D.

Role-Based Access Control (RBAC)


Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions