Snowflake ADA-C01 SnowPro Advanced Administrator Online Training
Snowflake ADA-C01 Online Training
The questions for ADA-C01 were last updated at Nov 19,2024.
- Exam Code: ADA-C01
- Exam Name: SnowPro Advanced Administrator
- Certification Provider: Snowflake
- Latest update: Nov 19,2024
When a role is dropped, which role inherits ownership of objects owned by the dropped role?
- A . The SYSADMIN role
- B . The role above the dropped role in the RBAC hierarchy
- C . The role executing the command
- D . The SECURITYADMIN role
Company A uses Snowflake to manage audio files of call recordings. Company A hired Company B, who also uses Snowflake, to transcribe the audio files for further analysis.
Company A’s Administrator created a share.
What object should be added to the share to allow Company B access to the files?
- A . A secure view with a column for file URLs.
- B . A secure view with a column for pre-signed URLs.
- C . A secure view with a column for METADATA$FILENAME.
- D . A secure view with a column for the stage name and a column for the file path.
A retailer uses a TRANSACTIONS table (100M rows, 1.2 TB) that has been clustered by the STORE_ID column (varchar (50)). The vast majority of analyses on this table are grouped by STORE_ID to look at store performance.
There are 1000 stores operated by the retailer but most sales come from only 20 stores. The Administrator notes that most queries are currently experiencing poor pruning, with large amounts of bytes processed by even simple queries.
Why is this occurring?
- A . The STORE_ID should be numeric.
- B . The table is not big enough to take advantage of the clustering key.
- C . Sales across stores are not uniformly distributed.
- D . The cardinality of the stores to transaction count ratio is too low to use the STORE_ID as a clustering key.
A team is provisioning new lower environments from the production database using cloning. All production objects and references reside in the database, and do not have external references.
What set of object references needs to be re-pointed before granting access for usage?
- A . Sequences, views, and secure views
- B . Sequences, views, secure views, and materialized views
- C . Sequences, storage integrations, views, secure views, and materialized views
- D . There are no object references that need to be re-pointed
Which function is the role SECURITYADMIN responsible for that is not granted to role USERADMIN?
- A . Reset a Snowflake user’s password
- B . Manage system grants
- C . Create new users
- D . Create new roles
An Administrator has a table named SALES_DATA which needs some edits, but the Administrator does not want to change the main table data. The Administrator decides to make a transient copy of this table and wants the transient table to have all the same permissions as the original table.
How can the Administrator create the transient table so it inherits the same permissions as the original table, and what considerations need to be made concerning the requirements? (Select TWO).
- A . Use the following SQL command:
create transient table TRANSIENT_SALES_DATA as select * from SALES_DATA; - B . Use the following SQL command:
create transient table TRANSIENT SALES DATA as select * from SALES_DATA copy grants; - C . Use the following SQL commands:
create transient table TRANSIENT_SALES_DATA like SALES_DATA copy grants; insert into TRANSIENT_SALES_DATA select * from SALES_DATA; - D . Transient tables will persist until explicitly dropped and contribute to overall storage costs.
- E . Transient tables will be purged at the end of the user session and do not have any Fail-safe period.
Which actions are considered breaking changes to data that is shared with consumers in the Snowflake Marketplace? (Select TWO).
- A . Dropping a column from a table
- B . Deleting data from a table
- C . Unpublishing the data listing
- D . Renaming a table
- E . Adding region availability to the listing
What are the MINIMUM grants required on the database, schema, and table for a stream to be properly created and managed?
- A . Database: Usage
Schema: Usage
Table: Select, Create Stream - B . Database: Usage
Schema: Usage
Table: Select - C . Database: Usage, Create Stream
Schema: Usage
Table: Select - D . Database: Usage
Schema: Usage, Create Stream
Table: Select
An Administrator has been asked to support the company’s application team need to build a loyalty program for its customers. The customer table contains Personal Identifiable Information (PII), and the application team’s role is DEVELOPER.
CREATE TABLE customer_data (
customer_first_name string,
customer_last_name string,
customer_address string,
customer_email string,
… some other columns,
);
The application team would like to access the customer data, but the email field must be obfuscated.
How can the Administrator protect the sensitive information, while maintaining the usability of the data?
- A . Create a view on the customer_data table to eliminate the email column by omitting it from the SELECT clause. Grant the role DEVELOPER access to the view.
- B . Create a separate table for all the non-Pll columns and grant the role DEVELOPER access to the new table.
- C . Use the CURRENT_ROLE and CURRENT_USER context functions to integrate with a secure view and filter the sensitive data.
- D . Use the CURRENT_ROLE context function to integrate with a masking policy on the fields that contain sensitive data.
An organization’s sales team leverages this Snowflake query a few times a day:
SELECT CUSTOMER ID, CUSTOMER_NAME, ADDRESS, PHONE NO FROM CUSTOMERS WHERE LAST UPDATED BETWEEN TO_DATE (CURRENT_TIMESTAMP) AND (TO_DATE (CURRENT_TIMESTAMP) -7);
What can the Snowflake Administrator do to optimize the use of persisted query results whenever possible?
- A . Wrap the query in a User-Defined Function (UDF) to match syntax execution.
- B . Assign everyone on the sales team to the same virtual warehouse.
- C . Assign everyone on the sales team to the same security role.
- D . Leverage the CURRENT_DATE function for date calculations.