[COF-C02] SnowPro Core Certification Mock Exam - 2 Flashcards
Which privilege is required to change a warehouse’s state (stop, start, suspend, resume)?
OPERATE
Enables changing the state of a warehouse (stop, start, suspend, resume). In addition, enables viewing current and past queries executed on a warehouse and aborting any executing queries.
Which sampling method keywords are used to specify which method to use?
BERNOULLI | ROW and SYSTEM | BLOCK are used to specify the sampling method in SELECT query.
If you create a user with MUST_CHANGE_PASSWORD = TRUE in a Snowflake federated environment, will that user be forced to change the password while logging through IdP the first time?
No
The MUST_CHANGE_PASSWORD user property does not apply for federated authentication and should not be used
UDF does not support SQL DDL / DML? (True/Fales)
True
UDF does not support SQL DDL / DML. That means you can select from a table, but you can’t create or modify tables inside of a UDF.
Which function can be used in combination with COPY command to convert the rows in a relational table to a single VARIANT column and unload the rows into a file?
The OBJECT_CONSTRUCT function can be used in combination with the COPY command to convert the rows in a relational table to a single VARIANT column and unload the rows into a file.
Which command is used to create a security integration to enable an HTTP client that supports OAuth to redirect users to an authorization page and generate access tokens for access to the REST API endpoint?
CREATE SECURITY INTEGRATION command is used to create a security integration that supports OAuth to redirect users to an authorization page and generate access tokens for access to the REST API endpoint.
Cloning a table replicates the source table’s structure, data, load history, and certain other properties (e.g., STAGE FILE FORMAT). (True/False)
False
Cloning a table replicates the source table’s structure, data, and certain other properties (e.g., STAGE FILE FORMAT). A cloned table does not include the load history of the source table. One consequence is that data files loaded into a source table can be loaded again into its clones.
Snowflake data providers can share data from one database per share. Data from multiple databases can not be shared with a share. (True/False)
False
Snowflake data providers can share data that resides in different databases by using secure views.
A secure view can reference objects such as schemas, tables, and other views from one or more databases, as long as these databases belong to the same account.
During Warehouse provisioning, if any of the compute resources fail to provision, then Snowflake kills the entire warehouse provisioning and tries to provision a new warehouse of the same requested size. (True/False)
False
If any of the compute resources for the warehouse fail to provision during start-up, Snowflake attempts to repair the failed resources.
TRUNCATE is a DDL or DML
DML because it does not alter the database structure
Which SQL Queries can be answered completely by Metadata?
SHOW Commands, MIN, MAX (integers and dates), and COUNT SQL queries take advantage of the Metadata cache and do not require the virtual warehouse, but you still have some cloud service charges.
Both non-materialized and materialized views can be defined as secure. (True / False)
True
Yes, both non-materialized and materialized views can be defined as secure.
Which of the Snowflake shared view can be used to query the Snowflake Query History?
QUERY_HISTORY view in ACCOUNT_USAGE view can be used to query Snowflake query history by various dimensions (time range, session, user, warehouse, etc.) within the last 365 days (1 year).
How many network policies can be activated for a user at a time?
Only a single network policy can be activated for each user at a time; however, different network policies can be activated for different users for granular control. Associating a network policy with a user automatically removes the currently-associated network policy (if any)
UDF runs with either the caller’s or the owner’s rights. (True / False)
False
UDF only runs as the function owner.
Which features of Snowflake provide Column-level security?
Dynamic Data Masking is a Column-level Security feature that uses masking policies to selectively mask plain-text data in table and view columns at query time.
External Tokenization enables accounts to tokenize data before loading it into Snowflake and detokenize the data at query runtime. Tokenization is the process of removing sensitive data by replacing it with an undecipherable token. External Tokenization makes use of masking policies with external functions.
When the Virtual Warehouse data cache gets filled up, in which fashion does the data get flushed out from the data cache?
MOST-RECENTLY USED (MRU) or LEAST-RECENTLY USED (LRU)
If the cache does fill up, it is flushed out in a least-recently used fashion.
If DATA_RETENTION_TIME_IN_DAYS is set to a value of 0, and MIN_DATA_RETENTION_TIME_IN_DAYS is set higher at the account level and is greater than 0, which value (0 or higher) setting takes precedence?
The higher value setting takes precedence. The data retention period for an object is determined by MAX(DATA_RETENTION_TIME_IN_DAYS, MIN_DATA_RETENTION_TIME_IN_DAYS).
Which columns gets appended on creating a stream on a table?
Adding a stream to a table appends three metadata columns:
- METADATA$ACTION,
- METADATA$ISUPDATE
- METADATA$ROW_ID.
How long does Snowflake keep batch load history (from Stage) using COPY statement?
Snowflake keeps the batch load history for 64 days.
What is the name of the Snowflake tool utilized for diagnosing network connectivity issues?
The Snowflake Connectivity Diagnostic Tool (SnowCD) aids users in diagnosing and resolving network connection issues to Snowflake.