How can a Snowflake Architect meet this requirement with the LEAST amount of coding?
Files arrive in an external stage every 10 seconds from a proprietary system. The files range in size from 500 K to 3 MB. The data must be accessible by dashboards as soon as it arrives. How can a Snowflake Architect meet this requirement with the LEAST amount of coding?...
Which of the following is recommended for optimizing the cost associated with the Snowflake Kafka connector?
An Architect is designing a pipeline to stream event data into Snowflake using the Snowflake Kafka connector. The Architect’s highest priority is to configure the connector to stream data in the MOST cost-effective manner. Which of the following is recommended for optimizing the cost associated with the Snowflake Kafka connector?A...
What is the BEST way to find recent and ongoing login attempts to Snowflake?
The IT Security team has identified that there is an ongoing credential stuffing attack on many of their organization’s system. What is the BEST way to find recent and ongoing login attempts to Snowflake?A . Call the LOGIN_HISTORY Information Schema table function.B . Query the LOGIN_HISTORY view in the ACCOUNT_USAGE...
When using the Snowflake Connector for Kafka, what data formats are supported for the messages? (Choose two.)
When using the Snowflake Connector for Kafka, what data formats are supported for the messages? (Choose two.)A . CSVB . XMLC . AvroD . JSONE . ParquetView AnswerAnswer: C, D Explanation: The data formats that are supported for the messages when using the Snowflake Connector for Kafka are Avro and...
At which object type level can the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY privileges be granted?
At which object type level can the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY privileges be granted?A . GlobalB . DatabaseC . SchemaD . TableView AnswerAnswer: A Explanation: The object type level at which the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY...
To meet these requirements, which design elements must be implemented?
An Architect on a new project has been asked to design an architecture that meets Snowflake security, compliance, and governance requirements as follows: 1) Use Tri-Secret Secure in Snowflake 2) Share some information stored in a view with another Snowflake customer 3) Hide portions of sensitive information from some columns...
What is a characteristic of loading data into Snowflake using the Snowflake Connector for Kafka?
What is a characteristic of loading data into Snowflake using the Snowflake Connector for Kafka?A . The Connector only works in Snowflake regions that use AWS infrastructure.B . The Connector works with all file formats, including text, JSON, Avro, Ore, Parquet, and XML.C . The Connector creates and manages its...
Which security, governance, and data protection features require, at a MINIMUM, the Business Critical edition of Snowflake? (Choose two.)
Which security, governance, and data protection features require, at a MINIMUM, the Business Critical edition of Snowflake? (Choose two.)A . Extended Time Travel (up to 90 days)B . Customer-managed encryption keys through Tri-Secret SecureC . Periodic rekeying of encrypted dataD . AWS, Azure, or Google Cloud private connectivity to SnowflakeE...
Which feature provides the capability to define an alternate cluster key for a table with an existing cluster key?
Which feature provides the capability to define an alternate cluster key for a table with an existing cluster key?A . External tableB . Materialized viewC . Search optimizationD . Result cacheView AnswerAnswer: B Explanation: A materialized view is a feature that provides the capability to define an alternate cluster key...
Which approach will meet these requirements if Role-Based Access Policies (RBAC) is a viable option for isolating tenants?
A Snowflake Architect is designing an application and tenancy strategy for an organization where strong legal isolation rules as well as multi-tenancy are requirements. Which approach will meet these requirements if Role-Based Access Policies (RBAC) is a viable option for isolating tenants?A . Create accounts for each tenant in the...