Practice Free COF-C02 Exam Online Questions
How can a data provider ensure that a data consumer is going to have access to the required objects?
- A . Enable the data sharing feature in the account and validate the view.
- B . Use the CURRENT_ROLE and CURRENT_USER functions to validate secure views.
- C . Use the CURRENT_ function to authorize users from a specific account to access rows in a base
table. - D . Set the SIMULATED DATA SHARING CONSUMER session parameter to the name of the consumer account for which access is being simulated.
Which activities are included in the Cloud Sen/ices layer? (Select TWO).
- A . Data storage
- B . Dynamic data masking
- C . Partition scanning
- D . User authentication
- E . Infrastructure management
Which activities are included in the Cloud Sen/ices layer? (Select TWO).
- A . Data storage
- B . Dynamic data masking
- C . Partition scanning
- D . User authentication
- E . Infrastructure management
Which statements are true concerning Snowflake’s underlying cloud infrastructure? (Select THREE),
- A . Snowflake data and services are deployed in a single availability zone within a cloud provider’s region.
- B . Snowflake data and services are available in a single cloud provider and a single region, the use of multiple cloud providers is not supported.
- C . Snowflake can be deployed in a customer’s private cloud using the customer’s own compute and storage resources for Snowflake compute and storage
- D . Snowflake uses the core compute and storage services of each cloud provider for its own compute and storage
- E . All three layers of Snowflake’s architecture (storage, compute, and cloud services) are deployed and managed entirely on a selected cloud platform
- F . Snowflake data and services are deployed in at least three availability zones within a cloud provider’s region
Users are responsible for data storage costs until what occurs?
- A . Data expires from Time Travel
- B . Data expires from Fail-safe
- C . Data is deleted from a table
- D . Data is truncated from a table
The Information Schema and Account Usage Share provide storage information for which of the following objects? (Choose three.)
- A . Users
- B . Tables
- C . Databases
- D . Internal Stages
When loading data into Snowflake via Snowpipe what is the compressed file size recommendation?
- A . 10-50 MB
- B . 100-250 MB
- C . 300-500 MB
- D . 1000-1500 MB
A developer is granted ownership of a table that has a masking policy. The developer’s role is not able to see the masked data.
Will the developer be able to modify the table to read the masked data?
- A . Yes, because a table owner has full control and can unset masking policies.
- B . Yes, because masking policies only apply to cloned tables.
- C . No, because masking policies must always reference specific access roles.
- D . No, because ownership of a table does not include the ability to change masking policies
Which of the following are handled by the cloud services layer of the Snowflake architecture? (Choose two.)
- A . Query execution
- B . Data loading
- C . Time Travel data
- D . Security
- E . Authentication and access control
If a multi-cluster warehouse is using an economy scaling policy, how long will queries wait in the queue before another cluster is started?
- A . 1 minute
- B . 2 minutes
- C . 6 minutes
- D . 8 minutes