Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

SnowPro CoreFree trialFree trial

By snowflake
Aug, 2025

Verified

25Q per page

Question 151

Which actions can be performed using a resource monitor in Snowflake? (Choose two.)

  • A: Monitor the performance of individual queries in real-time.
  • B: Automatically allocate more storage space to a virtual warehouse.
  • C: Modify the queries being executed within a virtual warehouse.
  • D: Suspend a virtual warehouse when its credit usage reaches a defined limit.
  • E: Trigger a notification to account administrators when credit usage reaches a specified threshold.

Question 152

Which Snowflake native tool can be used to diagnose and troubleshoot network connections?

  • A: SnowSQL
  • B: Snowflake Python connector
  • C: Snowsight
  • D: SnowCD

Question 153

Why would a Snowflake user load JSON data into a VARIANT column instead of a string column?

  • A: A VARIANT column is more secure than a string column.
  • B: A VARIANT column compresses data and a string column does not.
  • C: A VARIANT column can be used to create a data hierarchy and a string column cannot.
  • D: A VARIANT column will have a better query performance than a string column.

Question 154

How can a 5 GB table be downloaded into a single file MOST efficiently?

  • A: Keep the default MAX_FILE_SIZE to 16 MB.
  • B: Set the default MAX_FILE_SIZE to 5 GB.
  • C: Set the SINGLE parameter to TRUE.
  • D: Use a regular expression in the stage specifications of the COPY command.

Question 155

Which security models are used in Snowflake to manage access control? (Choose two.)

  • A: Discretionary Access Control (DAC)
  • B: Identity Access Management (IAM)
  • C: Mandatory Access Control (MAC)
  • D: Role-Based Access Control (RBAC)
  • E: Security Assertion Markup Language (SAML)

Question 156

Which Snowflake governance feature allows users to assign metadata labels to improve data governance and database access control?

  • A: Secure functions
  • B: Secure views
  • C: Object tagging
  • D: Row-level security

Question 157

True or False: Data Providers can share data with only the Data Consumer.

  • A: True
  • B: False

Question 158

What is the MINIMUM Snowflake edition that supports database replication?

  • A: Standard
  • B: Enterprise
  • C: Business Critical
  • D: Virtual Private Snowflake (VPS)

Question 159

Which Snowflake function and command combination should be used to convert rows in a relational table to a single VARIANT column, and unload the rows into a file in JSON format? (Choose two.)

  • A: PUT
  • B: GET
  • C: COPY
  • D: EXPORT
  • E: OBJECT_CONSTRUCT

Question 160

What Snowflake recommendation is designed to ensure that staged data is only loaded once?

  • A: Partitioning staged data files
  • B: Loading only the most recently-staged data files
  • C: Removing data files after loading
  • D: Identifying and removing duplicates after each data load

Question 161

Which privilege grants the ability to set a column-level security masking policy on a table or view column?

  • A: APPLY
  • B: CREATE
  • C: SET
  • D: MODIFY

Question 162

When sharing data in Snowflake, what privileges does a Provider need to grant along with a share? (Choose two.)

  • A: USAGE on the specific tables in the database.
  • B: MODIFY on the specific tables in the database.
  • C: SELECT on the specific tables in the database.
  • D: USAGE on the database and the schema containing the tables to share.
  • E: OPERATE on the database and the schema containing the tables to share.

Question 163

How can the Query Profile be used to troubleshoot a problematic query?

  • A: It will indicate if a virtual warehouse memory is too small to run the query.
  • B: It will indicate if a user lacks the privileges needed to run the query.
  • C: It will indicate if a virtual warehouse is in auto-scale mode.
  • D: It will indicate if the user has enough Snowflake credits to run the query.

Question 164

Which data type can be used for floating-point numbers without losing precision?

  • A: BINARY
  • B: VARIANT
  • C: INTEGER
  • D: DOUBLE

Question 165

Which data sharing option allows a Snowflake user to set up and manage a group of accounts and offer a share to that group?

  • A: Free listing
  • B: Paid listing
  • C: Direct share
  • D: Data Exchange

Question 166

What kind of authentication do Snowpipe REST endpoints use?

  • A: OAuth
  • B: Key-based
  • C: Username and password
  • D: Single Sign-On (SSO)

Question 167

What are the possible values within a METADATA$ACTION column in a Snowflake stream? (Choose two.)

  • A: INSERT
  • B: UPDATE
  • C: DELETE
  • D: TRUNCATE
  • E: UPSERT

Question 168

The fail-safe retention period is how many days?

  • A: 1 day
  • B: 7 days
  • C: 45 days
  • D: 90 days

Question 169

What is the MINIMUM Snowflake edition that offers data protection for extremely sensitive data, such as Protected Health Information (PHI)?

  • A: Standard
  • B: Enterprise
  • C: Business Critical
  • D: Virtual Private Snowflake (VPS)

Question 170

What takes the highest precedence in Snowflake file format options, when specified in multiple locations during data loading?

  • A: The stage definition
  • B: The table definition
  • C: The use of a COPY INTO [table] statement
  • D: The use of a COPY INTO [location] statement

Question 171

Which service or tool is a Command Line Interface (CLI) client used for connecting to Snowflake to execute SQL queries?

  • A: Snowsight
  • B: SnowCD
  • C: Snowpark
  • D: SnowSQL

Question 172

What Snowflake objects can contain custom application logic written in JavaScript? (Choose two.)

  • A: Stored procedures
  • B: Stages
  • C: Tasks
  • D: Views
  • E: User-Defined Functions (UDFs)

Question 173

What is the MINIMUM Snowflake edition required to use the column-level security feature?

  • A: Standard
  • B: Enterprise
  • C: Business Critical
  • D: Virtual Private Snowflake (VPS)

Question 174

Which command should be used to assign a key to a Snowflake user who needs to connect using key pair authentication?

  • A: ALTER USER jsmith SET RSA_P8_KEY='MIIBIjANBgkqh...';
  • B: ALTER USER jsmith SET ENCRYPTED_KEY='MIIBIjANBgkqh...';
  • C: ALTER USER jsmith SET RSA_PRIVATE_KEY='MIIBIjANBgkqh...';
  • D: ALTER USER jsmith SET RSA_PUBLIC_KEY='MIIBIjANBgkqh...';

Question 175

Secured Data Sharing is allowed for which Snowflake database objects? (Choose two.)

  • A: Tables
  • B: User-Defined Table Functions (UDTFs)
  • C: Secure views
  • D: Stored procedures
  • E: Worksheets
Page 7 of 53 • Questions 151-175 of 1320

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!