3 Months Free Update
3 Months Free Update
3 Months Free Update
What is the MINIMUM edition of Snowflake that is required to use a SCIM security integration?
Which stages are used with the Snowflake PUT command to upload files from a local file system? (Choose three.)
What impacts the credit consumption of maintaining a materialized view? (Choose two.)
Which of the following practices are recommended when creating a user in Snowflake? (Choose two.)
Which of the following are best practice recommendations that should be considered when loading data into Snowflake? (Select TWO).
Which data types does Snowflake support when querying semi-structured data? (Select TWO)
Which account__usage views are used to evaluate the details of dynamic data masking? (Select TWO)
Which command can be used to stage local files from which Snowflake interface?
True or False: Reader Accounts are able to extract data from shared data objects for use outside of Snowflake.
Which of the following describes how multiple Snowflake accounts in a single organization relate to various cloud providers?
A user has an application that writes a new Tile to a cloud storage location every 5 minutes.
What would be the MOST efficient way to get the files into Snowflake?
Which Snowflake objects track DML changes made to tables, like inserts, updates, and deletes?
The Snowflake cloud services layer is responsible for which tasks? (Choose two.)
Which command is used to unload data from a Snowflake table into a file in a stage?
What Snowflake features allow virtual warehouses to handle high concurrency workloads? (Select TWO)
Which of the following Snowflake features provide continuous data protection automatically? (Select TWO).
The Snowflake Cloud Data Platform is described as having which of the following architectures?
Which of the following significantly improves the performance of selective point lookup queries on a table?
Which Snowflake layer is always leveraged when accessing a query from the result cache?
For non-materialized views, what column in Information Schema and Account Usage identifies whether a view is secure or not?