- (Topic 2)
Files have been uploaded to a Snowflake internal stage. The files now need to be deleted. Which SQL command should be used to delete the files?
Correct Answer:
C
The SQL command used to delete files from a Snowflake internal stage is REMOVE. This command can be used to remove files from either an internal or external stage within Snowflake
- (Topic 6)
Snowflake's access control framework combines which models for securing data? (Select TWO).
Correct Answer:
BD
Snowflake's access control framework utilizes a combination of Discretionary Access Control (DAC) and Role-based Access Control (RBAC). DAC in Snowflake allows the object owner to grant access privileges to other roles. RBAC involves assigning roles to users and then granting privileges to those roles. Through roles, Snowflake manages which users have access to specific objects and what actions they can perform, which is central to security and governance in the Snowflake environment.References:Snowflake Documentation on Access Control,
- (Topic 1)
What is a limitation of a Materialized View?
Correct Answer:
D
Materialized Views in Snowflake are designed to store the result of a query and can be refreshed to maintain up-to-date data. However, they have certain limitations, one of which is that they cannot be defined using a JOIN clause. This means that a Materialized View can only be created based on a single source table and cannot combine data from multiple tables using JOIN operations.
References:
✑ Snowflake Documentation on Materialized Views
✑ SnowPro® Core Certification Study Guide
- (Topic 2)
What are the correct parameters for time travel and fail-safe in the Snowflake Enterprise Edition?
Correct Answer:
D
In the Snowflake Enterprise Edition, the default Time Travel retention is set to 1 day, the maximum Time Travel retention can be set up to 90 days, and the Fail-safe retention time is 7 days3.
- (Topic 3)
What is the difference between a stored procedure and a User-Defined Function (UDF)?
Correct Answer:
A
Stored procedures in Snowflake can perform a variety of database operations, including DDL and DML, whereas UDFs are designed to return values and cannot execute database operations1.