0% found this document useful (0 votes)
214 views90 pages

Access and Security Part - 5

The document discusses questions about Snowflake concepts including access and security, federated authentication, roles, and networking. It provides explanations for multiple choice questions covering topics such as maintaining user credentials with federation enabled, role privileges, and best practices for analyzing warehouse size.

Uploaded by

mojem69856
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
214 views90 pages

Access and Security Part - 5

The document discusses questions about Snowflake concepts including access and security, federated authentication, roles, and networking. It provides explanations for multiple choice questions covering topics such as maintaining user credentials with federation enabled, role privileges, and best practices for analyzing warehouse size.

Uploaded by

mojem69856
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 90

Access and Security & Performance Concepts part -5

Question 1:
Skipped
If an account has federated authentication enabled. Can Snowflake admins still maintain
user IDs and passwords in Snowflake?

Yes

(Correct)

No

Explanation
With federated authentication enabled on an account, Snowflake still allows maintaining and
using Snowflake user credentials (login name and password). In other words:
 Account and security administrators can still create users with passwords maintained in
Snowflake.
 Users can still log into Snowflake using their Snowflake credentials.

However, if federated authentication is enabled for an account, Snowflake does not recommend
maintaining user passwords in Snowflake. Instead, user passwords should be maintained solely
in your IdP.

Question 2:
Skipped
Readers accounts enable providers to share data with consumers who are not already
Snowflake customers without requiring the consumers to become Snowflake Customers.
Which role can create the Reader account?

SYSADMIN

SECURITYADMIN

USERADMIN

ACCOUNTADMIN

(Correct)

Explanation
ACCOUNTADMIN role (or a role granted the CREATE ACCOUNT global privilege) only
can create the Reader account.
Question 3:
Skipped
If you have privileges to view queries executed by another user, the Query Detail page
displays the details for the query and the actual query result. (TRUE/FALSE)


FALSE

(Correct)

TRUE

Explanation
If you have privileges to view queries executed by another user, the Query Detail page displays
the details for the query, but, for data privacy reasons, the page does not display the actual query
result.
Question 4:
Skipped
Which role is inherited to every other role in the account?

ACCOUNTADMIN

SECURITYADMIN

PUBLIC

(Correct)


USERADMIN

SYSADMIN

Explanation
The PUBLIC role is Pseudo-role, which is automatically granted to every user and every
role in your account. This role is typically used in cases where explicit access control is not
needed, and all users are viewed as equal with regard to their access rights.
Question 5:
Skipped
What is the best practice after creating a custom role in a Snowflake account?

Grant PUBLIC to the role so all database objects owned by PUBLIC will be
available to the new role.

Grant the role to the USERADMIN role so users can be added to the role.

Grant ownership of the role to itself so a member of the role can control access to
the role.


Grant the custom role to the SYSADMIN role so administrators can manage all
objects in the account.

(Correct)

Explanation
The custom role gets mainly created for specific access to specific objects. As per best practice,
grant ownership to SYSADMIN or a child role under SYSADMIN so that SYSADMIN can
control access to the objects.
Question 6:
Skipped
An account-level resource monitor overrides the resource monitor assignment for
individual warehouses. (True/False)

FALSE

(Correct)

TRUE

Explanation
An account-level resource monitor does not override resource monitor assignments for
individual warehouses. If either the account resource monitor or the warehouse resource monitor
reaches its defined threshold and a suspend action has been defined, the warehouse is suspended.
Question 7:
Skipped
Which of these SQL Queries can be answered completely by Metadata? (Select 3)


None of these

AVG

COUNT

(Correct)

MIN, MAX (integers and dates)

(Correct)

SHOW Commands

(Correct)

Explanation
SHOW Commands, MIN, MAX (integers and dates), and COUNT SQL queries take
advantage of the Metadata cache and do not require the virtual warehouse, but you still
have some cloud service charges.
Question 8:
Skipped
If a user is logged in to Snowflake in a federated environment and IdP times out, what does
happen to the user's snowflake session?

It does not affect the user's Snowflake sessions. However, to initiate any new
Snowflake sessions, the user must log into the IdP again.

(Correct)

The Snowflake web interface is disabled, and the prompt for IdP authentication is
displayed.

Explanation
After a specified period of time (defined by the IdP), a user’s session in the IdP
automatically times out, but this does not affect their Snowflake sessions. Any Snowflake
sessions that are active at the time remain open and do not require re-authentication.
However, to initiate any new Snowflake sessions, the user must log into the IdP again.
Question 9:
Skipped
A DBA_ROLE created a database. Later the DBA_ROLE was dropped. Who will own the
database now, which was created by the DBA_ROLE?

The DBA_ROLE can't get dropped as it is the database owner.

No one will be able to access the database.


The database will get dropped too.

The role that dropped the DBA_ROLE will own the database.

(Correct)

Explanation
The role that dropped the DBA_ROLE will own the database.
Question 10:
Skipped
Which of these system-defined roles can manage operations at the organizational level?

SYSADMIN

SECURITYADMIN

ORGADMIN

(Correct)


USERADMIN

ACCOUNTADMIN

Explanation
ORGADMIN role manages operations at the organizational level.

More specifically, this role:

 Can create accounts in the organization.


 Can view all accounts in the organization (using SHOW ORGANIZATION
ACCOUNTS) and all regions enabled for the organization (using SHOW REGIONS).
 Can view usage information across the organization.
Question 11:
Skipped
Snowflake blocks certain IPs by default to ensure that customer is getting the highest level
of Network security. (TRUE / FALSE)

FALSE

(Correct)

TRUE

Explanation
By default, Snowflake allows users to connect to the service from any computer or device
IP address. A security administrator (or higher) can create a network policy to allow or deny
access to a single IP address or a list of addresses.
Question 12:
Skipped
What is the best way to analyze the optimum warehouse size?

Execute relatively homogeneous queries (size, complexity, data sets, etc.) on the
same warehouse

(Correct)

Execute queries of widely-varying size and/or complexity on the same warehouse

Explanation
To achieve the best results, try to execute relatively homogeneous queries (size, complexity, data
sets, etc.) on the same warehouse; executing queries of widely-varying size and/or complexity on
the same warehouse makes it more difficult to analyze warehouse load, which can make it more
difficult to select the best size to match the size, composition, and number of queries in your
workload.
Question 13:
Skipped
If you create a Network Policy by providing both 'Allowed IP Addresses' and 'Blocked IP
Addresses', which is applied first by Snowflake while validating the access?

Blocked IP Addresses
(Correct)

Allowed IP Addresses

Explanation
If you provide both Allowed IP Addresses and Blocked IP Addresses, Snowflake applies the
Blocked List first.
Question 14:
Skipped
The major benefits of defining Clustering keys: (Select 2)

To help in organizing small tables (<1 GB)

To help improve query performance

(Correct)

To help in faster data sharing

To help optimize table maintenance

(Correct)
Explanation
Defining clustering keys for very large tables (in the multi-terabyte range) helps optimize
table maintenance and query performance. Small tables are not a good candidate for
clustering.
Question 15:
Skipped
Which role has privileges to create warehouses and databases (and other objects) in an
account?

SECURITYADMIN

ACCOUNTADMIN

ORGADMIN

USERADMIN

SYSADMIN

(Correct)
Explanation
SYSADMIN role has privileges to create warehouses and databases (and other objects) in
an account. This role also has the ability to grant privileges on warehouses, databases, and other
objects to other roles.
Question 16:
Skipped
Which IdP vendors provide native Snowflake support For federated authentication and SSO?
(Select 2)

Microsoft ADFS

(Correct)

Okta

(Correct)

Google G Suite

Onelogin


Microsoft Azure Active Directory

Explanation
Okta and Microsoft ADFS provide native Snowflake support for federated authentication and
SSO.
Question 17:
Skipped
You can create a user-level network policy using _____

Snowsight

SQL

(Correct)

Only Snowflake Support can create the Account level Network Policy

Classic Web Interface

Explanation
You can set a policy at the user level, but this can only be done through the SQL
commands. To activate a network policy for an individual user, set the NETWORK_POLICY
parameter for the user using ALTER USER.
Question 18:
Skipped
Which privilege is required to enable altering any properties of the resource monitor, such
as changing the monthly credit quote?

USAGE

MODIFY

(Correct)

MONITOR

Explanation
MODIFY - Enables altering any properties of a resource monitor, such as changing the monthly
credit quota.

MONITOR - Enables viewing a resource monitor.

Question 19:
Skipped
Snowflake’s approach to access control combines aspects from which of the following models?
(Select 2)

Rule-based access control (RBAC)


Mandatory Access Control (MAC)

Role-based Access Control (RBAC)

(Correct)

Discretionary Access Control (DAC)

(Correct)

Explanation
Snowflake’s approach to access control combines aspects from both of the following models:

Discretionary Access Control (DAC): Each object has an owner, who can in turn grant access
to that object.

Role-based Access Control (RBAC): Access privileges are assigned to roles, which are in turn
assigned to users.

Question 20:
Skipped
The warehouse performance can be evaluated by querying the

Account Usage QUERY_HISTORY view


(Correct)

Account Usage LOAD_HISTORY view

Information Schema LOAD_HISTORY view

Information Schema QUERY_HISTORY view

Explanation
The warehouse performance can be evaluated by querying the Account Usage
QUERY_HISTORY view.
Question 21:
Skipped
You can create an an account level network policy using _____ (Select all that apply)

Snowsight

(Correct)

SQL

(Correct)

Classic Web Interface

(Correct)

Only Snowflake Support can create the Account level Network Policy

Explanation
Only security administrators (i.e., users with the SECURITYADMIN role) or higher or a role
with the global CREATE NETWORK POLICY privilege can create network policies using
Snowsight, Classic Web Interface, and SQL.
Question 22:
Skipped
Which of the Snowflake shared view can be used to query the Snowflake Query History? (Select
1)

QUERY_HISTORY view in INFORMATION_SCHEMA

QUERY_HISTORY_VIEW view in ACCOUNT_USAGE

QUERY_HISTORY view in ACCOUNT_USAGE

(Correct)

QUERY_HISTORY_VIEW view in INFORMATION_USAGE


Explanation
QUERY_HISTORY view in ACCOUNT_USAGE view can be used to query Snowflake query
history by various dimensions (time range, session, user, warehouse, etc.) within the last 365
days (1 year).
Question 23:
Skipped
A user can be assigned multiple roles. (True / False)

TRUE

(Correct)

FALSE

Explanation
Roles are the entities to which privileges on securable objects can be granted and revoked. Roles
are assigned to users to allow them to perform actions required for business functions in their
organization. A user can be assigned multiple roles. It allows users to switch roles (i.e., choose
which role is active in the current Snowflake session) to perform different actions using separate
sets of privileges.
Question 24:
Skipped
The BI group is complaining about their queries taking too long to run. Checking the
virtual warehouse information shows that the queued time is pretty high. What is the best
way to fix this issue?

Determine which users have the high priority queries and set the other users

Increase the virtual warehouse MAX_CLUSTER_COUNT property

(Correct)

Provide a virtual warehouse for every user in the group

Increase the size of the virtual warehouse

Set the STATEMENT_QUEUED_TIMEOUT_IN_SECONDS parameter to a low


value to cancel those queries if they get in the queue

Explanation
Queuing can be solved by SCALE-OUT (provision new clusters), i.e., increasing
MAX_CLUSTER_COUNT helps in additional cluster provisioning to handle the concurrent
workloads.
Question 25:
Skipped
Suppose we resize a warehouse to a smaller size while it is executing SQL statements. There
will be no impact on already executing SQL statements. (True / False)

FALSE

TRUE

(Correct)

Explanation
Resizing a warehouse does not impact the statements that the warehouse is executing. When
resizing to a smaller size, compute resources are removed from the warehouse only when they
are no longer used to execute any current statements.
Question 26:
Skipped
When the Virtual Warehouse data cache gets filled up, in which fashion does the data get
flushed out from the data cache?

Last In Last Out (LILO)

MOST-RECENTLY USED (MRU)


LEAST-RECENTLY USED (LRU)

(Correct)

First In First Out (FIFO)

Explanation
If the cache does fill up, it is flushed out in a least-recently used fashion.
Question 27:
Skipped
Which of these objects are not replicated? (Select 2)

External Tables

(Correct)

Transient Tables

Views


Temporary Tables

(Correct)

Permanent Tables

Explanation
Temporary Tables, External Tables, Stages, Temporary Stages, Streams, and Tasks do not
get replicated.
Question 28:
Skipped
Network policies allow restricting access to your account based on_____ (Select all that
apply)

User Operating System Type (example - MAC, Windows)

CIDR Notaion based IP ranges

(Correct)

IP address

(Correct)
Explanation
Network policies allow restricting access to your account based on user IP address.
Effectively, a network policy enables you to create an IP allowed list, as well as an IP
blocked list, if desired.
Question 29:
Skipped
Which of these are types of Scaling policies? (Select 2)

Business

Maximized

Standard

(Correct)

Minimized

Economy

(Correct)
Explanation
There are two different scaling policies, one is the Standard policy, and one is
the Economy policy.
Question 30:
Skipped
Which SQL command determines whether a network policy is set on the account or for a
specific user?

SHOW POLICIES

SHOW NETWORK_POLICIES

SHOW PARAMETER

SHOW PARAMETERS

(Correct)

SHOW POLICY

Explanation
The SHOW PARAMETERS command determines whether a network policy is set on the
account or for a specific user.

For Account level: SHOW PARAMETERS LIKE 'network_policy' IN ACCOUNT;

For User level: SHOW PARAMETERS LIKE 'network_policy' IN USER <username>;

Example - SHOW PARAMETERS LIKE 'network_policy' IN USER john;

Question 31:
Skipped
Suppose you have an auto-scaling mode setup with a Economy policy. In what situation
does Snowflake spin up an additional cluster?

Only if the system estimates there’s enough query load to keep the cluster busy for
at least 6 minutes.

(Correct)

The first cluster starts immediately when either a query is queued or the system
detects that there’s one more query than the currently-running clusters can execute.

Explanation
In Economy Scaling policy, Snowflake spins up an additional cluster only if the system estimates
there’s enough query load to keep the cluster busy for a least 6 minutes
Question 32:
Skipped
Which objects are the securable objects in Snowflake? (Select all that apply)

Database

(Correct)

Table

(Correct)

Warehouse

(Correct)

File Format

(Correct)

Explanation
All of these are securable objects in Snowflake. A securable Object is an entity to which
access can be granted. Unless allowed by a grant, access will be denied.
Question 33:
Skipped
What key insights can we get from the Explain plan in Snowflake? (Select 3)


Join Ordering

(Correct)

Estimated Query Time

Partition Pruning

(Correct)

Join Types

(Correct)

Exact Query Time

Explanation
The key insights that the explain plan gives us in its results output are information on partition
pruning, join ordering, and join types. The explain plan is a useful tool for determining the
efficiency of your query. It's a command that compiles your query to figure out all the steps
Snowflake would have to work through if it were actually to run the query.
Question 34:
Skipped
Monica has run a query SELECT * FROM t1; After a couple of hours, John ran the same
query. John has the same role as Monica and has the SELECT permissions on table t1.
John got the result sooner than Monica. What could be the reason for the faster result?

John's query resulted from the Local Disk cache.

John's query resulted from the Metadata cache.

John's query resulted from the Query Result cache.

(Correct)

John's query resulted from Remote disk.

Explanation
It is a typical use case of Query Result Cache. It is stored and managed by the Cloud Services
Layer. It is used if the identical query is run and base tables (t1 in this case) have not changed.
Query Result Cache doesn't require Virtual Warehouse and is available for other users in the
same role with SELECT permissions on all tables in the query.
Question 35:
Skipped
How many network policies can be activated for a user at a time?


100

31

(Correct)

99

16

Explanation
Only a single network policy can be activated for each user at a time; however, different
network policies can be activated for different users for granular control. Associating a network
policy with a user automatically removes the currently-associated network policy (if any)
Question 36:
Skipped
All files stored in internal stages for data loading and unloading are automatically encrypted
using AES-256 strong encryption. (True/False)


FALSE

TRUE

(Correct)

Explanation
All files stored in internal stages for data loading and unloading are automatically
encrypted using AES-256 strong encryption.
Question 37:
Skipped
A role inherits all the privileges of those higher in the hierarchy. (True / False)

FALSE

(Correct)

TRUE

Explanation
A role inherits all the privileges of its underlying roles (those "lower" in the hierarchy).
ACOOUNTADMIN inherits privileges from SECURITYADMIN, USERADMIN, SYSADMIN,
and PUBLIC. SECURITYADMIN inherits privileges from USERADMIN and PUBLIC.
USERADMIN and SYSADMIN inherit privileges from PUBLIC PUBLIC inherits nothing.
Question 38:
Skipped
What is a key benefit of scaling out a warehouse?

Scaling out improves concurrency.

(Correct)

Scaling out improves performance.

Explanation
Scaling out is explicitly designed for handling queuing and performance issues related to large
numbers of concurrent users and/or queries.
Question 39:
Skipped
Which of these configurations will set up a warehouse in auto-scale mode?

Minimum Clusters = 2 and Maximum Clusters = 6

(Correct)

Minimum Clusters = 6 and Maximum Clusters = 6

Explanation
Auto-scale mode is enabled by specifying different values for maximum and minimum number
of clusters.
Question 40:
Skipped
John has a table EMPLOYEE_DATA, and he wants to create another table
EMPLOYEE_DATA_OTHER, which should be the same as EMPLOYEE_DATA table
with the same data. What is the best option for John?

Create the table with LIKE SQL command as follows - CREATE TABLE
EMPLOYEE_DATA_OTHER LIKE EMPLOYEE_DATA;

Create the table with same data with SQL command as follows - CREATE TABLE
EMPLOYEE_DATA_OTHER AS SELECT * FROM EMPLOYEE_DATA;

CREATE SHARE EMPLOYEE_DATA;

Clone the table with same data with SQL command as follows - CREATE TABLE
EMPLOYEE_DATA_OTHER CLONE EMPLOYEE_DATA;

(Correct)

Explanation
The best option is to Clone the table as EMPLOYEE_DATA and EMPLOYEE_DATA_OTHER
have the same structure and data. It will help save the storage cost. LIKE command only creates
the empty table. CREATE TABLE … AS SELECT (also referred to as CTAS) Creates a new
table populated with the data returned by a query but consumes additional storage.
Question 41:
Skipped
Which AWS service is used to create private VPC endpoints that allow direct, secure
connectivity between your AWS VPCs and the Snowflake VPC without traversing the
public internet?

Snowflake PrivateLink

AWS Direct Connect

AWS PrivateLink

(Correct)

AWS PrivateVPC

Explanation
AWS PrivateLink is an AWS service for creating private VPC endpoints that allow direct,
secure connectivity between your AWS VPCs and the Snowflake VPC without traversing
the public internet. The connectivity is for AWS VPCs in the same AWS region.

For External Functions, you can also use AWS PrivateLink with private endpoints.
In addition, if you have an on-premises environment (e.g. a non-hosted data center), you can
choose to use AWS Direct Connect, in conjunction with AWS PrivateLink, to connect all your
virtual and physical environments in a single, private network.

Question 42:
Skipped
Which of these roles can configure a network policy? (Select 2)

USERADMIN

SYSADMIN

ACCOUNTADMIN

(Correct)

SECURITYADMIN

(Correct)

PUBLIC
Explanation
Only security administrators (i.e., users with the SECURITYADMIN role) or higher or a
role with the global CREATE NETWORK POLICY privilege can create network policies.
Question 43:
Skipped
In a Snowflake federated environment, Snowflake serves as the Identity provider (IdP).
(True/False)

TRUE

FALSE

(Correct)

Explanation
In a Snowflake federated environment, Snowflake serves as the Service Provider (SP). The
external, independent entity like Okta serves as the Identify Provider (IdP)
Question 44:
Skipped
The user access history can be found by querying the

Information Schema ACCESS_HISTORY view

Account Usage ACCESS_REPORT view


Account Usage ACCESS_HISTORY view

(Correct)

Information Schema ACCESS_REPORT view

Explanation
Access History in Snowflake refers to when the user query reads column data and when the SQL
statement performs a data write operation, such as INSERT, UPDATE, and DELETE, along with
variations of the COPY command, from the source data object to the target data object. The user
access history can be found by querying the Account Usage ACCESS_HISTORY view.
Question 45:
Skipped
Federated Authentication is supported by the following:

(Select all that apply)

Enterprise Edition

(Correct)

VPS
(Correct)

Business Critical

(Correct)

Standard Edition

(Correct)

Explanation
Federated authentication is supported by all of the Snowflake editions.
Question 46:
Skipped
When deciding whether to suspend a warehouse or leave it running, what should you
consider?

Consider the trade-off between saving credits by suspending the warehouse versus
maintaining the cache of data from the previous queries to help with performance.

(Correct)

Consider the trade-off between saving credits by suspending the warehouse versus
the operational cost of resuming the warehouse when needed.

Consider suspending the warehouse if the warehouse is large and there are no active
queries.

Explanation
Consider the trade-off between saving credits by suspending a warehouse versus maintaining the
cache of data from previous queries to help with performance.
Question 47:
Skipped
ACCOUNTADMIN role should not be used to create objects in Snowflake?(True/False)

TRUE

(Correct)

FALSE

Explanation
The ACOOUNTADMIN role is intended for performing initial setup tasks in the system
and managing account-level objects and tasks on a day-to-day basis. It should not be used
to create objects in your account unless you absolutely need these objects to have the
highest level of secure access.
Question 48:
Skipped
Snowflake network policies currently support both Internet Protocol versions 4 and 6 (i.e., IPv4
as well as IPv6). (True/False)

TRUE

FALSE

(Correct)

Explanation
Network policies currently support only Internet Protocol version 4 (i.e. IPv4) addresses.
Question 49:
Skipped
During Warehouse provisioning, if any of the compute resources fail to provision, then
Snowflake kills the entire warehouse provisioning and tries to provision a new warehouse
of the same requested size. (True/False)

TRUE

FALSE

(Correct)

Explanation
Snowflake does not begin executing SQL statements submitted to a warehouse until all of the
compute resources for the warehouse are successfully provisioned, unless any of the resources
fail to provision: If any of the compute resources for the warehouse fail to provision during start-
up, Snowflake attempts to repair the failed resources. During the repair process, the warehouse
starts processing SQL statements once 50% or more of the requested compute resources are
successfully provisioned.
Question 50:
Skipped
Which of these configurations will set up a warehouse in maximized mode?

Minimum Clusters = 9 and Maximum Clusters = 10

Minimum Clusters = 1 and Maximum Clusters = 1

Minimum Clusters = 1 and Maximum Clusters = 10

Minimum Clusters = 6 and Maximum Clusters = 6

(Correct)

Explanation
Maximized mode is enabled by specifying the same value for both maximum and minimum
number of clusters (note that the specified value must be larger than 1). In this mode, when the
warehouse is started, Snowflake starts all the clusters so that maximum resources are available
while the warehouse is running. This mode is effective for statically controlling the available
compute resources, particularly if you have large numbers of concurrent user sessions and/or
queries and the numbers do not fluctuate significantly.
Question 51:
Skipped
Which of these roles is dedicated to user and role management only?

USERADMIN

(Correct)

ORGADMIN

SECURITYADMIN

SYSADMIN

ACCOUNTADMIN

Explanation
USERADMIN role is dedicated to user and role management only. More specifically, this
role:
 Is granted the CREATE USER and CREATE ROLE security privileges.
 Can create users and roles in the account.
This role can also manage users and roles that it owns. Only the role with the OWNERSHIP
privilege on an object (i.e. user or role), or a higher role, can modify the object properties.

Question 52:
Skipped
Dynamic Data Masking is supported by (Select all that apply)

Standard Edition

VPS

(Correct)

Enterprise Edition

(Correct)

Business Critical

(Correct)

Explanation
Dynamic Data Masking features require Enterprise Edition (or higher).
Question 53:
Skipped
Permissions on database objects such as databases or tables are granted to:

Schemas

Users

Roles

(Correct)

Virtual Warehouses

Explanation
Snowflake supports Role-Based Access control. Permissions on database objects such as
databases or tables are granted to Roles.
Question 54:
Skipped
How can you create a "Super-User" or "Super-Role" in Snowflake who can bypass all the
authorization checks?

ACCOUNTADMIN role is same as Super-Role


There is no concept of SUPER-ROLE or SUPER-USER in Snowflake

(Correct)

Contact Snowflake personnel to create a Super-Role or Super-User for your account

CREATE ROLE SUPER_ROLE;

Explanation
There is no concept of a “super-user” or “super-role” in Snowflake that can bypass
authorization checks. All-access requires appropriate access privileges.
Question 55:
Skipped
Both non-materialized and materialized views can be defined as secure. (True / False)

FALSE

TRUE

(Correct)

Explanation
Yes, both non-materialized and materialized views can be defined as secure.
Question 56:
Skipped
Multi-cluster warehouses are beneficial in improving the performance of slow-running
queries or data loading. (True/False)

FALSE

(Correct)

TRUE

Explanation
Multi-cluster warehouses are best utilized for scaling resources to improve concurrency for
users/queries. They are not as beneficial for improving the performance of slow-running queries
or data loading. For these types of operations, resizing the warehouse provides more benefits.
Question 57:
Skipped
Which of these security features are supported in Snowflake? (Select all that apply)

Tri-Secret Secure Encryption

(Correct)


Multi-Factor Authentication

(Correct)

Network Policy

(Correct)

Role-Based Access Control

(Correct)

Explanation
Snowflake is a highly secured platform and provides multi-level security like Multi-Factor
Authentication (MFA), provision to set up Network policy to block access by unwanted IPs,
Single Sign On (SSO), Role-Based Access Control, and Tri Secret Secure, and so on. Tri-
Secret Secure is the combination of a Snowflake-maintained key and a customer-managed key in
the cloud provider platform that hosts your Snowflake account to create a composite master key
to protect your Snowflake data.
Question 58:
Skipped
There are two modes to set up a multi-cluster warehouse. Select those from the given
choices.

Maximum mode

Auto-scaling mode

(Correct)

Maximized mode

(Correct)

Minimized mode

Minimum mode

Explanation
There are two ways to set up a multi-cluster warehouse: in maximized mode, or auto-scaling
mode. With maximized mode, you simply set your minimum equal to your maximum, and those
values are something greater than one.
Question 59:
Skipped
Which of these roles is granted the MANAGE GRANTS security privilege to be able to
modify any grant globally, including revoking it?


SYSADMIN

ORGADMIN

ACCOUNTADMIN

SECURITYADMIN

(Correct)

USERADMIN

Explanation
SECURITYADMIN role can manage any object grant globally, as well as create, monitor, and
manage users and roles. More specifically, this role:
 Is granted the MANAGE GRANTS security privilege to be able to modify any grant,
including revoking it.
 Inherits the privileges of the USERADMIN role via the system role hierarchy (i.e.
USERADMIN role is granted to SECURITYADMIN).
Question 60:
Skipped
You have a dashboard that connects to Snowflake via JDBC. The dashboard is refreshed
hundreds of times per day. The data is very stable, only changing once or twice per day.
The query run by the dashboard user never changes. How will Snowflake manage
changing and non-changing data? Mark all true statements.

Snowflake will compile result cache data from all user results, so no warehouse is
needed.

Snowflake will re-use data from the Results Cache as long as it is still the most up-
to-date data available.

(Correct)

Snowflake will spin up a warehouse only if the underlying data has changed.

(Correct)

Snowflake will show the most up-to-date data each time the dashboard is refreshed.

(Correct)

Explanation
Until data has not changed and the query is the same - Snowflake reuses the data from the
cache. Please note, Each time the persisted result for a query is reused, Snowflake resets the 24-
hour retention period for the result up to a maximum of 31 days from the date and time that the
query was first executed. After 31 days, the result is purged, and the next time the query is
submitted, a new result is generated and persisted.
Question 61:
Skipped
How can we turn off the query result cache?

Setting the parameter USE_CACHED_RESULT to FALSE

(Correct)

Setting the parameter USE_CACHED_INFO to FALSE

Query result cache can be turned off.

Setting the parameter USE_QUERY_CACHED to FALSE

Explanation
We can turn off the query result cache by setting the parameter USE_CACHED_RESULT to
FALSE. Though the only reason we would really want to do this is if we are doing performance
testing.
Question 62:
Skipped
Materialized views can improve the performance of queries that use the same subquery
results repeatedly. (True/False)


TRUE

(Correct)

FALSE

Explanation
Materialized views are designed to improve query performance for workloads composed of
common, repeated query patterns. However, materializing intermediate results incur additional
costs. As such, before creating any materialized views, you should consider whether the costs are
offset by the savings from re-using these results frequently enough.
Question 63:
Skipped
Which privilege is required to enable changing the state of a warehouse (stop, start,
suspend, resume)?

MONITOR

USAGE

MODIFY


OPERATE

(Correct)

Explanation
MODIFY - Enables altering any properties of a warehouse, including changing its size. Required
to assign a warehouse to a resource monitor. Note that only the ACCOUNTADMIN role can
assign warehouses to resource monitors. MONITOR - Enables viewing current and past queries
executed on a warehouse as well as usage statistics on that warehouse. OPERATE - Enables
changing the state of a warehouse (stop, start, suspend, resume). In addition, enables viewing
current and past queries executed on a warehouse and aborting any executing queries. USAGE -
Enables using a virtual warehouse and, as a result, executing queries on the warehouse. If the
warehouse is configured to auto-resume when a SQL statement (e.g. query) is submitted to it, the
warehouse resumes automatically and executes the statement. OWNERSHIP - Grants full control
over a warehouse. Only a single role can hold this privilege on a specific object at a time. ALL
[ PRIVILEGES ] - Grants all privileges, except OWNERSHIP, on the warehouse.
Question 64:
Skipped
A user's default role is

the name used to log in to the Snowflake WebUI.

always the default PUBLIC role.

changed each time the user logs in to Snowflake.


the role a user gets set to each time the user logs in to Snowflake.

(Correct)

Explanation
A user's default role is the role a user gets set to each time the user logs in to
Snowflake. Snowflake uses roles to control the objects (virtual warehouses, databases, tables,
etc.) that users can access:

Snowflake provides a set of predefined roles, as well as a framework for defining a hierarchy of
custom roles. All Snowflake users are automatically assigned the predefined PUBLIC role,
which enables login to Snowflake and basic object access.

In addition to the PUBLIC role, each user can be assigned additional roles, with one of these
roles designated as their default role. A user’s default role determines the role used in the
Snowflake sessions initiated by the user; however, this is only a default. Users can change roles
within a session at any time.

Roles can be assigned at user creation or afterward.

Question 65:
Skipped
If you want to create a warehouse that remains in a suspended state initially, which
property do you need to set for that warehouse?

INITIALLY_SUSPENDED = TRUE

(Correct)

AUTO_SUSPEND = 0

AUTO_SUSPEND = TRUE

AUTO_RESUME = TRUE

AUTO_RESUME = FALSE

Explanation
INITIALLY_SUSPENDED = TRUE | FALSE Specifies whether the warehouse is created
initially in the ‘Suspended’ state. The valid values are TRUE and FALSE. TRUE: The
warehouse is created, but suspended. FALSE: The warehouse starts running after it is created.
Default is FALSE
Question 66:
Skipped
Which privilege is required to execute queries using a virtual warehouse?

MONITOR


USAGE

(Correct)

OPERATE

MODIFY

Explanation
Virtual Warehouse Privileges: USAGE: Enables using a virtual warehouse and, as a result,
executing queries on the warehouse. If the warehouse is configured to auto-resume when a SQL
statement (e.g. query) is submitted to it, the warehouse resumes automatically and executes the
statement.

MODIFY: Enables altering any properties of a warehouse, including changing its size.
Required assigning a warehouse to a resource monitor. Note that only the ACCOUNTADMIN
role can assign warehouses to resource monitors.

MONITOR: Enables viewing of current and past queries executed on a warehouse as well as
usage statistics on that warehouse.

OPERATE: Enables changing the state of a warehouse (stop, start, suspend, resume). In
addition, enables viewing current and past queries executed on a warehouse and aborting any
executing queries.

OWNERSHIP: Grants full control over a warehouse. Only a single role can hold this privilege
on a specific object at a time.

Question 67:
Skipped
Which of these is not a valid authentication method supported by Snowflake?

Muti-factor authentication

Username and one-time generated pin

(Correct)

SCIM (System for Cross-domain Identity Management specification)

Username and password

Oauth, Key Pair

Federated Authentication (SAM 2.0)

Explanation
Snowflake supports the following authentication methods:
 Username and password
 MFA
 SAML
 other authentication methods such as OAuth, Key-pair, and SCIM.
Question 68:
Skipped
Materialized views are particularly useful when:

(Select 3)

The view’s base table changes frequently.

Query results contain results that require significant processing.

(Correct)

The view’s base table does not change frequently.

(Correct)

Query results contain a small number of rows and/or columns relative to the base
table (the table on which the view is defined).
(Correct)

Query results contain results that require simple processing.

Explanation
Materialized views are particularly useful when: - Query results contain a small number of rows
and/or columns relative to the base table (the table on which the view is defined). - Query results
contain results that require significant processing, including: Analysis of semi-structured data.
Aggregates that take a long time to calculate. - The query is on an external table (i.e., data sets
stored in files in an external stage), which might have a slower performance compared to
querying native database tables. - The view’s base table does not change frequently.
Question 69:
Skipped
Monica ran a SELECT query on a large table t1. The query took longer than expected. She
looked into the query profile and found that ' Bytes spilled to local storage' and 'Bytes
spilled to remote storage' are very high. What advice will you give to her to improve the
query performance? (Select 3)

Using a larger warehouse (effectively increasing the available memory/local disk


space for the operation)

(Correct)

Processing data in larger batches


Processing data in smaller batches

(Correct)

Increasing the number of parallel queries running in the warehouse

Trying to split the processing into several steps

(Correct)

Explanation
When Snowflake warehouse cannot fit an operation in memory, it starts spilling (storing) data
first to the local disk of a warehouse node and then to remote storage. In such a case, Snowflake
first tries to temporarily store the data on the warehouse's local disk. As this means extra IO
operations, any query that requires spilling will take longer than a similar query running on
similar data that is capable to fit the operations in memory. Also, if the local disk is insufficient
to fit the spilled data, Snowflake further tries to write to the remote cloud storage, which will be
shown in the query profile as "Bytes spilled to remote storage".

The spilling can't always be avoided, especially for large batches of data, but it can be
decreased by:

 Reducing the amount of data processed. For example, by trying to improve partition
pruning or projecting only the columns that are needed in the output.
 Decreasing the number of parallel queries running in the warehouse.
 Trying to split the processing into several steps (for example, by replacing the CTEs with
temporary tables).
 Using a larger warehouse - effectively means more memory and more local disk space.
Question 70:
Skipped
What will happen if you add 0.0.0.0/0 to BLOCKED_IP_LIST and your IP address to
ALLOWED_IP_LIST of a Network policy?

You will not be able to access the Snowflake account from your IP address.

(Correct)

You will be able to access the Snowflake account from your IP address

Explanation
If you provide both Allowed IP Addresses and Blocked IP Addresses, Snowflake applies the
Blocked List first. This would block your own access.

Additionally, in order to block all IP addresses except a select list, you only need to add IP
addresses to ALLOWED_IP_LIST. Snowflake automatically blocks all IP addresses not
included in the allowed list.

Question 71:
Skipped
If you drop or disable a user in Snowflake in an Okta IdP federated environment, the user
can still access Snowflake login through Okta. (True/False)


TRUE

FALSE

(Correct)

Explanation
Users who are dropped or disabled in Snowflake are still able to log into their Okta
accounts, but they will receive an error message when they attempt to connect to
Snowflake. You must recreate or enable the user before they can log in.
Question 72:
Skipped
Snowflake prunes micro-partitions based on a predicate with a subquery, even if the
subquery result is constant. (TRUE/FALSE)

TRUE

FALSE

(Correct)

Explanation
Please note, not all predicate expressions can be used to prune. Snowflake does not prune
micro-partitions based on a predicate with a subquery, even if the subquery results in a
constant.
Question 73:
Skipped
Which of the Snowflake editions provides a federated authorization feature?

All of the Snowflake Editions

(Correct)

Standard

Business Critical

Virtual Private Snowflake(VPS)

Enterprise

Explanation
All Snowflake Editions (Standard, Enterprise, Business Critical, Virtual Private
Snowflake) provide Federated Authentication.
Question 74:
Skipped
A user cannot view the result set from a query that another user executed except for the
ACCOUNTADMIN role. (True / False)

FALSE

(Correct)

TRUE

Explanation
A user cannot view the result set from a query that another user executed. This behavior is
intentional. For security reasons, only the user who executed a query can access the query
results. This behavior is not connected to the Snowflake access control model for objects. Even a
user with the ACCOUNTADMIN role cannot view the results for a query run by another
user.
Question 75:
Skipped
Snowflake supports multi-factor authentication (i.e., MFA) to provide increased login
security for users connecting to Snowflake. Which role is strongly recommended for using
MFA?

USERADMIN

SYSADMIN

ACCOUNTADMIN

(Correct)

USERADMIN

Explanation
Snowflake strongly recommends that all users with the ACCOUNTADMIN role be required to
use MFA.
Question 76:
Skipped
What will happen if a policy is assigned to a user who is already signed in?

There will be no interruption until the user logoffs and signs in again.

The user can't do anything else until signed in and signed back in again.

(Correct)

The user can continue running the SQL queries in the currently opened session.

Explanation
If a policy is assigned to a user who already signed in, they can't do anything else until they
sign and signed back in again to make use of the new policy
Question 77:
Skipped
Which type of object key is only used for decryption?

None of these

Retired Key

(Correct)

Active key

Destroyed key

Explanation
Active Key is used for both encryption and decryption. The retired Key is used for decryption
only. The destroyed Key is no longer used.
Question 78:
Skipped
What is a key benefit of scaling up a warehouse?


Scaling up improves performance.

(Correct)

Scaling up improves concurrency.

Explanation
Resizing a warehouse generally improves query performance, particularly for larger, more
complex queries. It can also help reduce the queuing that occurs if a warehouse does not have
enough compute resources to process all the queries that are submitted concurrently. Note that
warehouse resizing is not intended for handling concurrency issues; instead, use additional
warehouses to handle the workload or use a multi-cluster warehouse.
Question 79:
Skipped
What would happen if we suspend the warehouse while it is executing the SQL statement?

All compute resources of the warehouse will be up until the statement is complete.

All the compute resources of the warehouse will be shut down immediately, and the
running statement will be canceled.

Only idle compute resources of the warehouse will be shut down, allowing any
compute resources executing statements to continue until the statement is complete.
(Correct)

When trying to suspend the warehouse, we will get an error while the same
warehouse is executing SQL statements.

Explanation
When we suspend a warehouse, Snowflake immediately shuts down all idle compute resources
for the warehouse. However, it allows any compute resources executing statements to continue
until the statements are complete. At this time, the resources are shut down, and the warehouse
status changes to “Suspended”. Compute resources waiting to shut down are considered to be in
“quiesce” mode.
Question 80:
Skipped
Which one is not the Snowflake System-Defined role?

SYSADMIN

DATABASEADMIN

(Correct)

SECURITYADMIN

ORGADMIN

USERADMIN

ACCOUNTADMIN

Explanation
The following are the Snowflake System-Defined roles:

ORGADMIN

ACCOUTADMIN

SECURITYADMIN

USERADMIN

SYSADMIN

PUBLIC.

System-defined roles cannot be dropped. In addition, the privileges granted to these roles by
Snowflake cannot be revoked.

Question 81:
Skipped
What is the minimum billing charge for provisioning compute resources?

120 seconds

30 seconds

1 second

60 seconds

(Correct)

Explanation
The minimum billing charge for provisioning compute resources is 1 minute (i.e. 60 seconds).
There is no benefit to stopping a warehouse before the first 60-second period is over because the
credits have already been billed for that period.
Question 82:
Skipped
Will these queries be considered as same to get the benefit of the Query Result cache?
Query 1 : SELECT * FROM t1; Query 2 : select * FROM t1;


YES

NO

(Correct)

Explanation
These queries will not be considered as same to get the benefit of the Query Result cache. First
Query has 'SELECT' is upper case, and the Second query has 'select' in lower case.
Question 83:
Skipped
ACCOUNTADMIN role cannot view the results for a query run by another user. (True/ False)

FALSE

TRUE

(Correct)

Explanation
A user cannot view the result set from a query that another user executed. This behavior is
intentional. For security reasons, only the user who executed a query can access the query
results. This behavior is not connected to the Snowflake access control model for objects. Even a
user with the ACCOUNTADMIN role cannot view the results for a query run by another
user.
Question 84:
Skipped
Which of these are kind of Cache in Snowflake?

Query Result Cache

Data/Local Disk Cache

Metadata Cache

All of these

(Correct)

Explanation
Snowflake has three types of cache.
 The metadata cache that lives in the cloud services layer.
 The data cache/local disk cache that lives on the SSD drives in the virtual warehouses
 The query result cache. If a result is small, it will be stored in the cloud services layer, but
larger results are going to be stored in the storage layer.
Question 85:
Skipped
Which features of Snowflake provide Column-level security? (Select 2)


Column Masking

Internal Tokenization

External Tokenization

(Correct)

Dynamic Data Masking

(Correct)

Explanation
Dynamic Data Masking is a Column-level Security feature that uses masking policies to
selectively mask plain-text data in table and view columns at query time.

External Tokenization enables accounts to tokenize data before loading it into Snowflake and
detokenize the data at query runtime. Tokenization is the process of removing sensitive data by
replacing it with an undecipherable token. External Tokenization makes use of masking policies
with external functions.

Question 86:
Skipped
David ran a query that took around 30 mins to complete. He referred to the Query profiler
and found the 'Bytes spilled to local storage' has a big number. What could be the issue?

David should contact Snowflake Personnel.

David is using a comparatively smaller warehouse.

(Correct)

Warehouse size has no impact on Bytes spilling.

David is using a comparatively larger warehouse.

Explanation
If a node has insufficient memory to complete its portion of a query, it will "spill" to local SSD
storage. This can negatively impact performance but is sometimes acceptable. If a node has
insufficient local SSD storage to complete its portion of a query, it will "spill" to remote cloud
storage. This is almost always very bad for performance. The solution, in either case, is to
simplify the SQL query or increase the warehouse size.
Question 87:
Skipped
Which command will help you to view the current permissions on a Schema?

SHOW GRANTS ON SCHEMA <database_name>.<schema_name>;


(Correct)

SHOW ROLES ON SCHEMA <database_name>.<schema_name>;

SHOW ALL PREIVILEGE ON SCHEMA <database_name>.<schema_name>;

SHOW GRANTS OF SCHEMA <database_name>.<schema_name>;

Explanation
To view the current set of privileges granted on an object, you can execute the SHOW
GRANTS command. To view the current permissions on a schema, execute the following
command: SHOW GRANTS ON SCHEMA <database_name>.<schema_name>;
Question 88:
Skipped
Which of these system-defined roles encapsulates the SYSADMIN and SECURITYADMIN
roles?

SYSADMIN

SECURITYADMIN

ACCOUNTADMIN

(Correct)

USERADMIN

ORGADMIN

Explanation
ACCOUNTADMIN role encapsulates the SYSADMIN and SECURITYADMIN system-
defined roles. It is the top-level role in the system and should be granted only to a
limited/controlled number of users in your account.
Question 89:
Skipped
The closer the ratio of scanned micro-partitions and columnar data is to the ratio of actual data
selected, the more efficient the pruning performed on the table. (TRUE/FALSE)

FALSE

TRUE
(Correct)

Explanation
Snowflake uses columnar scanning of partitions so that an entire partition is not scanned if a
query only filters by one column. The closer the ratio of scanned micro-partitions and columnar
data is to the ratio of actual data selected, the more efficient is the pruning performed on the table
Question 90:
Skipped
Choose the true statements about Secure views. (Select 2)

Both non-materialized and materialized views can be defined as secure

(Correct)

Only materialized views can be defined as secure

Secure views provide improved data privacy and data sharing

(Correct)

Only non-materialized views can be defined as secure


Secure views allow faster access than Standard views

Explanation
Both non-materialized and materialized views can be defined as secure. Secure views have
advantages over standard views, including improved data privacy and data sharing;
however, they also have some performance impacts to take into consideration.
Question 91:
Skipped
If you create a user with MUST_CHANGE_PASSWORD = TRUE in a Snowflake
federated environment, will that user be forced to change the password while logging
through IdP the first time?

No

(Correct)

Yes

Explanation
The MUST_CHANGE_PASSWORD user property does not apply for federated
authentication and should not be used. In particular, if you choose not to maintain passwords
in Snowflake for users, ensure this property is set to FALSE for these users.
Question 92:
Skipped
How long do results remain in the Query results cache?

16 hours

24 hours

(Correct)

12 hours

31 hours

1 hours

Explanation
Results are retained for 24 hours in Query Result Cache. Snowflake resets the 24-hour retention
period for the result, up to a maximum of 31 days from the date and time that the query was first
executed. After 31 days, the result is purged and the next time the query is submitted, a new
result is generated and persisted.
Question 93:
Skipped
In a federated Snowflake environment, can a user still log into Snowflake using their
Snowflake credentials?

No

Yes

(Correct)

Explanation
Users can still log into Snowflake using their Snowflake credentials.
Question 94:
Skipped
Snowflake Query history page allows you to view the details of all the queries executed in
the last 31 days. (True/False)

FALSE

(Correct)

TRUE

Explanation
Snowflake Query history page allows you to view the details of all the queries executed in the
last 14 days. You can query the Query_History view in Snowflake's Account Usage schema for
older queries.
Question 95:
Skipped
A row access policy contains an expression that can specify Snowflake database objects
(e.g., table or view) and use functions to determine which rows should be visible in a given
context. Which of these functions are used in determining row access policy?(Select 2)

Conversion Functions

Metadata Functions

Conditional Expression Functions

(Correct)

Context Functions

(Correct)

Explanation
A row access policy uses Conditional Expression Functions and Context Functions to
determine which rows should be visible in a given context. Context Functions such as
CURRENT_USER(), CURRENT_ROLE(), and CURRENT_ACCOUNT(), which act as
dynamic filters and are commonly used with secure views to limit row access in a table.
Question 96:
Skipped
The suspended warehouse cannot be resized until they resume. (True / False)


FALSE

(Correct)

TRUE

Explanation
The suspended warehouse can be easily resized. Resizing a suspended warehouse does not
provision any new compute resources for the warehouse. It simply instructs Snowflake to
provision the additional compute resources when the warehouse is next resumed, at which time
all the usage and credit rules associated with starting a warehouse apply.
Question 97:
Skipped
Choose the false statements. (Select 2)

Results are stored in SSD in Virtual Warehouse in case of Local Disk Cache.

If Virtual Warehouse is suspended, then results in Local Disk Cache will be lost

Group and Execute similar queries on the different virtual warehouses to maximize
local disk cache reuse, for performance and cost optimization.

(Correct)

Results are stored in the Cloud Storage layer in the case of Local Disk Cache.

(Correct)

Group and Execute similar queries on the same virtual warehouse to maximize local
disk cache reuse, for performance and cost optimization.

Explanation
As a best practice, Group and Execute similar queries on the same virtual warehouse to
maximize local disk cache reuse for performance and cost optimization. The results get stored in
the SSD of Virtual Warehouse. So, if the Virtual Warehouse gets suspended, then results get lost.
Question 98:
Skipped
At what frequency does Snowflake rotate the object keys?

16 Days

60 Days

1 Year

30 Days

(Correct)

Explanation
All Snowflake-managed keys are automatically rotated by Snowflake when they are more
than 30 days old. Active keys are retired, and new keys are created. When Snowflake
determines the retired key is no longer needed, the key is automatically destroyed. When active,
a key is used to encrypt data and is available for usage by the customer. When retired, the key is
used solely to decrypt data and is only available for accessing the data.
Question 99:
Skipped
Which schema can be used to find out about storage, compute, and objects in a Snowflake
account?

INFORMATION_SCHEMA

(Correct)

USAGE_SCHEMA

SNOWFLAKE_SCHEMA

RESOURCE_SCHEMA

Explanation
INFORMATION_SCHEMA can be used to find out about storage, compute, and objects in a
Snowflake account. Every database that you create on Snowflake has a schema called
INFORMATION_SCHEMA that's automatically created, and inside that schema, you can find
views and table functions that provide metadata information about objects in your account.
Question 100:
Skipped
What are the security layers that Snowflake takes care of? (Select 4)

Authentication

(Correct)

Infrastructure

Data Protection

(Correct)


Access

(Correct)

Authorization

(Correct)

Explanation
Infrastructure Security is managed by the cloud provider.
Question 101:
Skipped
Is it possible to create a user without a password?

Yes

(Correct)

No

Explanation
Yes, it is possible to create a user in Snowflake without a password. We cannot use the
Snowflake web interface to create users with no passwords or remove passwords from existing
users, and we must use CREATE USER or ALTER USER. Without a password in Snowflake,
a user cannot log in using Snowflake authentication and must use federated authentication
instead.
Question 102:
Skipped
Which are the required parameters for creating a Network Policy? (Select 2)

Comment

Allowed IP Addresses

(Correct)

Policy Name

(Correct)

Blocked IP Addresses

Explanation
Policy Name and Allowed IP Addresses are mandatory for creating a Network
Policy. Blocked IP Addresses and Comment Parameters are optional.

Please Note - If you provide both Allowed IP Addresses and Blocked IP Addresses, Snowflake
applies the Blocked List first.

Question 103:
Skipped
Suppose we resize a warehouse to a larger size while it is executing SQL statements. In that
case, the already running SQL statements will finish faster. (True / False)

FALSE

(Correct)

TRUE

Explanation
Resizing a warehouse doesn’t have any impact on statements that are currently being executed
by the warehouse. When resizing to a larger size, the new compute resources, once fully
provisioned, are used only to execute statements that are already in the warehouse queue, as well
as all future statements submitted to the warehouse.
Question 104:
Skipped
Suppose you have an auto-scaling mode setup with a Standard policy. In what situation
does Snowflake spin up an additional cluster?

Only if the system estimates there’s enough query load to keep the cluster busy for
at least 6 minutes.

The first cluster starts immediately when either a query is queued or the system
detects that there’s one more query than the currently-running clusters can execute.
(Correct)

Explanation
In Standard Scaling policy, the first cluster starts immediately when either a query is queued, or
the system detects that there’s one more query than the currently-running clusters can execute.
Each successive cluster waits to start 20 seconds after the prior one has started. For example, if
your warehouse is configured with ten max clusters, it can take 200+ seconds to start all 10
clusters.
Question 105:
Skipped
How many servers are available in a large-sized cluster warehouse?

(Correct)

64

128

16


1

32

Explanation
There are eight servers available in a large-sized cluster warehouse.

You might also like