A. Network policy
B. End-to-end encryption
C. Multi-Factor Authentication (MFA)
D. Role-Based Access Control (RBAC)
A. True
B. False
A. Load now data
B. Query shared data
C. Update existing data
D. Create a new snare
A. Query the REPLICATION USAGE HISTORY view in the ORGANIZATION USAGE schema.
B. Query the ACCESS_HlSTORY view in the ACCOUNT_USAGE schema.
C. Review the granted privileges to the database object.
D. Review the row access policy for the database object.
A. The provisioning of new compute resources for the warehouse will begin immediately.
B. The warehouse will resume immediately and start to share the compute load with other running virtual warehouses.
C. The warehouse will remain suspended but new resources will be added to the query acceleration service.
D. The provisioning of additional compute resources will be in effect when the warehouse is next resumed.
A. Account and user authentication is only available with the Snowflake Business Critical edition.
B. Periodic rekeying of encrypted data is available with the Snowflake Enterprise edition and higher
C. Private communication to internal stages is allowed in the Snowflake Enterprise edition and higher.
D. Support for HIPAA and GDPR compliance is available for UI Snowflake editions.
A. Object-level access control
B. SOC 2 type II certification
C. Column-level security
D. Multi-factor Authentication (MFA)
A. SYSADMIN
B. Schema owner
C. Object owner
D. Database owner
A. No details of the query execution plan will be available in the query profiler.
B. Once created there is no way to determine if a view is secure or not.
C. The view definition of a secure view is still visible to users by way of the information schema.
D. Secure views do not take advantage of the same internal optimizations as standard views.
E. It is not possible to create secure materialized views.
A. Materialized Views
B. User-Defined Table Functions (UDTF)
C. External Tables
D. External Tokenization
A. There should be just one user with the ACCOUNTADMIN role in each Snowflake account.
B. The user should be required to use Multi-Factor Authentication (MFA).
C. The ACCCUKTMKIN role should be set as tie user's default role.
D. The user should use federated authentication instead of a password
A. Summarizing the throughput of Snowpipe costs for an account
B. Calculating the funds left on an account's contract
C. Gathering the hourly credit usage for an account
D. Compiling an account's average cloud services cost over the previous month