True or False: When you create a custom role, it is a best practice to immediately grant that role to ACCOUNTADMIN.

True or False: When you create a custom role, it is a best practice to immediately grant that role to ACCOUNTADMIN.A . True B. FalseView AnswerAnswer: B Explanation: Reference: https://docs.snowflake.com/en/user-guide/security-access-control-considerations.html

January 18, 2023 No Comments READ MORE +

Which of the following is a valid source for an external stage when the Snowflake account is located on Microsoft Azure?

Which of the following is a valid source for an external stage when the Snowflake account is located on Microsoft Azure?A . An FTP server with TLS encryption B. An HTTPS server with WebDAV C. A Google Cloud storage bucket D. A Windows server file share on AzureView AnswerAnswer: C

January 18, 2023 No Comments READ MORE +

Will data cached in a warehouse be lost when the warehouse is resized?

Will data cached in a warehouse be lost when the warehouse is resized?A . Possibly, if the warehouse is resized to a smaller size and the cache no longer fits. B. Yes. because the compute resource is replaced in its entirety with a new compute resource. C. No. because the...

January 18, 2023 No Comments READ MORE +

Which is the MINIMUM required Snowflake edition that a user must have if they want to use AWS/Azure Privatelink or Google Cloud Private Service Connect?

Which is the MINIMUM required Snowflake edition that a user must have if they want to use AWS/Azure Privatelink or Google Cloud Private Service Connect?A . Standard B. Premium C. Enterprise D. Business CriticalView AnswerAnswer: D Explanation: https://docs.snowflake.com/en/user-guide/privatelink-azure.html

January 18, 2023 No Comments READ MORE +

What are value types that a VARIANT column can store? (Select TWO)

What are value types that a VARIANT column can store? (Select TWO)A . STRUCT B. OBJECT C. BINARY D. ARRAY E. CLOBView AnswerAnswer: B,D Explanation: Characteristics of a VARIANT A VARIANT can store a value of any other type, including OBJECT and ARRAY. The maximum length of a VARIANT is...

January 18, 2023 No Comments READ MORE +

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?

A virtual warehouse's auto-suspend and auto-resume settings apply to which of the following?A . The primary cluster in the virtual warehouse B. The entire virtual warehouse C. The database in which the virtual warehouse resides D. The Queries currently being run on the virtual warehouseView AnswerAnswer: B Explanation: https://docs.snowflake.com/en/user-guide/warehouses-overview.html#:~:text=Similarly%2C%20auto%2Dresume%20ensures%20that,individual% 20clusters%20in%20the%20warehouse.

January 18, 2023 No Comments READ MORE +

When unloading to a stage, which of the following is a recommended practice or approach?

When unloading to a stage, which of the following is a recommended practice or approach?A . Set SINGLE: = true for larger files B. Use OBJECT_CONSTRUCT ( * ) when using Parquet C. Avoid the use of the CAST function D. Define an individual file formatView AnswerAnswer: C

January 17, 2023 No Comments READ MORE +

Which copy INTO command outputs the data into one file?

Which copy INTO command outputs the data into one file?A . SINGLE=TRUE B. MAX_FILE_NUMBER=1 C. FILE_NUMBER=1 D. MULTIPLE=FAISEView AnswerAnswer: A

January 17, 2023 No Comments READ MORE +

What happens when a cloned table is replicated to a secondary database? (Select TWO)

What happens when a cloned table is replicated to a secondary database? (Select TWO)A . A read-only copy of the cloned tables is stored. B. The replication will not be successful. C. The physical data is replicated D. Additional costs for storage are charged to a secondary account E. Metadata...

January 17, 2023 No Comments READ MORE +

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)A . SCIM B. Federated authentication C. TLS 1.2 D. Key-pair authentication E. OAuth F. OCSP authenticationView AnswerAnswer: B,D,E

January 17, 2023 No Comments READ MORE +