- (Topic 6)
Which Snowflake database object can be shared with other accounts?
Correct Answer:
C
In Snowflake, Secure User-Defined Functions (UDFs) can be shared with other accounts using Snowflake's data sharing feature. This allows different Snowflake accounts to securely execute the UDFs without having direct access to the underlying data the functions operate on, ensuring privacy and security. The sharing is facilitated through shares created in Snowflake, which can contain Secure UDFs along with other database objects like tables and views.References:Snowflake Documentation on Data Sharing and Secure UDFs
- (Topic 1)
A sales table FCT_SALES has 100 million records. The following Query was executed
SELECT COUNT (1) FROM FCT SALES;
How did Snowflake fulfill this query?
Correct Answer:
D
Snowflake is designed to optimize query performance by utilizing metadata for certain types of queries. When executing a COUNT query, Snowflake can often fulfill the request by accessing metadata about the table??s row count, rather than scanning the entire table or micro-partitions. This is particularly efficient for large tables like FCT_SALES with a significant number of records. The metadata layer maintains statistics about the table, including the row count, which enables Snowflake to quickly return the result of a COUNT query without the need to perform a full scan. References:
✑ Snowflake Documentation on Metadata Management
✑ SnowPro® Core Certification Study Guide
- (Topic 2)
Which command should be used to load data from a file, located in an external stage, into a table in Snowflake?
Correct Answer:
D
The COPY command is used in Snowflake to load data from files located in an external stage into a table. This command allows for efficient and parallelized data loading from various file formats1.
References = [COF-C02] SnowPro Core Certification Exam Study Guide, Snowflake Documentation
- (Topic 4)
What is the primary purpose of a directory table in Snowflake?
Correct Answer:
D
A directory table in Snowflake is used to store file-level metadata about the data files in a stage. It is conceptually similar to an external table and provides information such as file size, last modified timestamp, and file URL. References: [COF-C02] SnowPro Core Certification Exam Study Guide
- (Topic 5)
What happens when a network policy includes values that appear in both the allowed and blocked IP address list?
Correct Answer:
B
In Snowflake, when setting up a network policy that specifies both allowed and blocked IP address lists, if an IP address appears in both lists, access from that IP address will be denied. The reason is that Snowflake prioritizes security, and the presence of an IP address in the blocked list indicates it should not be allowed regardless of its presence in the allowed list. This ensures that access controls remain stringent and that any potentially unsafe IP addresses are not inadvertently permitted access.
References:
✑ Snowflake Documentation: Network Policies