Which of the following statements describes a benefit of Snowflake’s separation of compute and storage? (Choose all that apply.)

Which of the following statements describes a benefit of Snowflake’s separation of compute and storage? (Choose all that apply.)A . Growth of storage and compute are tightly coupled togetherB . Storage expands without the requirement to add more computeC . Compute can be scaled up or down without the requirement...

September 6, 2022 No Comments READ MORE +

True or False: Snowflake charges a premium for storing semi-structured data.

True or False: Snowflake charges a premium for storing semi-structured data.A . TrueB . FalseView AnswerAnswer: B Explanation: Reference: https://snowflakecommunity.force.com/s/question/0D50Z00008ckwNuSAI/does-snowflakecharges-premium-for-storing-semi-structured-data

September 6, 2022 No Comments READ MORE +

Which of the following connectors allow Multi-Factor Authentication (MFA) authorization when connecting? (Choose all that apply.)

Which of the following connectors allow Multi-Factor Authentication (MFA) authorization when connecting? (Choose all that apply.)A . JDBCB . SnowSQLC . Snowflake Web Interface (UI)D . ODBCE . PythonView AnswerAnswer: A,B,C,D,E Explanation: Reference: https://docs.snowflake.com/en/user-guide/security-mfa.html

September 6, 2022 No Comments READ MORE +

True or False: Snowflake bills for a minimum of five minutes each time a Virtual Warehouse is started.

True or False: Snowflake bills for a minimum of five minutes each time a Virtual Warehouse is started.A . TrueB . FalseView AnswerAnswer: B Explanation: Reference: https://docs.snowflake.com/en/user-guide/credits.html

September 6, 2022 No Comments READ MORE +

Snowflake recommends, as a minimize, that all users with the following roles(s) should be enrolled in Multi-Factor Authentication (MFA):

Snowflake recommends, as a minimize, that all users with the following roles(s) should be enrolled in Multi-Factor Authentication (MFA):A . SECURITYADMIN, ACCOUNTADMIN, PUBLIC, SYSADMINB . SECURITYADMIN ACCOUNTADMIN, SYSADMINC . SECURITYADMIN, ACCOUNTADMIND . ACCOUNTADMINView AnswerAnswer: D Explanation: Reference: https://docs.snowflake.com/en/user-guide/security-mfa.html

September 6, 2022 No Comments READ MORE +

Which copy INTO command outputs the data into one file?

Which copy INTO command outputs the data into one file?A . SINGLE=TRUEB . MAX_FILE_NUMBER=1C . FILE_NUMBER=1D . MULTIPLE=FAISEView AnswerAnswer: B

September 6, 2022 No Comments READ MORE +

When scaling out by adding clusters to a multi-cluster warehouse, you are primarily scaling for improved:

When scaling out by adding clusters to a multi-cluster warehouse, you are primarily scaling for improved:A . ConcurrencyB . PerformanceView AnswerAnswer: A Explanation: Reference: https://docs.snowflake.com/en/user-guide/warehouses-multicluster.html

September 6, 2022 No Comments READ MORE +

True or False: A third-party tool that supports standard JDBC or ODBC but has no Snowflake-specific driver will be unable to connect to Snowflake.

True or False: A third-party tool that supports standard JDBC or ODBC but has no Snowflake-specific driver will be unable to connect to Snowflake.A . TrueB . FalseView AnswerAnswer: B Explanation: https://docs.snowflake.com/en/user-guide/jdbc.html Snowflake provides a JDBC type 4 driver that supports core JDBC functionality. The JDBC driver must be installed...

September 5, 2022 No Comments READ MORE +

Which statement about billing applies to Snowflake credits?

Which statement about billing applies to Snowflake credits?A . Credits are billed per-minute with a 60-minute minimumB . Credits are used to pay for cloud data storage usageC . Credits are consumed based on the number of credits billed for each hour that a warehouse runsD . Credits are consumed...

September 5, 2022 No Comments READ MORE +

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)A . SCIMB . Federated authenticationC . TLS 1.2D . Key-pair authenticationE . OAuthF . OCSP authenticationView AnswerAnswer: B,D,E

September 5, 2022 No Comments READ MORE +