Which of the following are characteristics of how row access policies can be applied to external tables? (Choose three.)
Which of the following are characteristics of how row access policies can be applied to external tables? (Choose three.)A . An external table can be created with a row access policy, and the policy can be applied to the VALUE column.B . A row access policy can be applied to...
What command will accomplish this?
A company has a table with that has corrupted data, named Data. The company wants to recover the data as it was 5 minutes ago using cloning and Time Travel. What command will accomplish this?A . CREATE CLONE TABLE Recover_Data FROM Data AT(OFFSET => -60*5);B . CREATE CLONE Recover_Data FROM...
Which command below will only copy the table structure from the existing table to the new table?
Which command below will only copy the table structure from the existing table to the new table?A . CREATE TABLE … AS SELECTB . CREATE TABLE … LIKEC . CREATE TABLE … CLONEView AnswerAnswer: B Explanation: CREATE TABLE … LIKE Creates a new table with the same column definitions as...
What will the below query return
What will the below query return SELECT TOP 10 GRADES FROM STUDENT;A . The top 10 highest gradesB . The 10 lowest gradesC . Non-deterministic list of 10 gradesView AnswerAnswer: C Explanation: An ORDER BY clause is not required; however, without an ORDER BY clause, the results are non-deterministic because...
Data sharing is supported only between provider and consumer accounts in same region
Data sharing is supported only between provider and consumer accounts in same regionA . TRUEB . FALSEView AnswerAnswer: B Explanation: please read the below link https://docs.snowflake.com/en/user-guide/secure-data-sharing-across-regions-plaforms.html
A user can change object parameters using which of the following roles?
A user can change object parameters using which of the following roles?A . ACCOUNTADMIN, SECURITYADMINB . SYSADMIN, SECURITYADMINC . ACCOUNTADMIN, USER with PRIVILEGED . SECURITYADMIN, USER with PRIVILEGEView AnswerAnswer: A
How does a standard virtual warehouse policy work in Snowflake?
How does a standard virtual warehouse policy work in Snowflake?A . It conserves credits by keeping running clusters fully loaded rather than starting additional clusters.B . It starts only if the system estimates that there is a query load that will keep the cluster busy for at least 6 minutes.C...
What is the appropriate command to provide the access?
A user needs access to create materialized view on a shema mydb.myschema. What is the appropriate command to provide the access?A . GRANT ROLE MYROLE TO USER USER1; GRANT CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO MYROLE;B . GRANT CREATE MATERIALIZED VIEW ON SCHEMA MYDB.MYSCHEMA TO USER USER1;C . GRANT...
Which are those?
Every Snowflake table loaded by the Kafka connector has a schema consisting of two VARIANT columns. Which are those?A . RECORD_CONTENTB . RECORD_METADATAC . RECORD_MESSAGEView AnswerAnswer: A,B Explanation: Schema of Topics for Kafka Topics Every Snowflake table loaded by the Kafka connector has a schema consisting of two VARIANT columns:
What is required to allow data sharing between these two companies?
Company A would like to share data in Snowflake with Company B. Company B is not on the same cloud platform as Company A. What is required to allow data sharing between these two companies? A. Create a pipeline to write shared data to a cloud storage location in the...