To meet these requirements, which design elements must be implemented?

An Architect on a new project has been asked to design an architecture that meets Snowflake security, compliance, and governance requirements as follows: 1) Use Tri-Secret Secure in Snowflake 2) Share some information stored in a view with another Snowflake customer 3) Hide portions of sensitive information from some columns...

February 4, 2024 No Comments READ MORE +

What is a characteristic of loading data into Snowflake using the Snowflake Connector for Kafka?

What is a characteristic of loading data into Snowflake using the Snowflake Connector for Kafka?A . The Connector only works in Snowflake regions that use AWS infrastructure.B . The Connector works with all file formats, including text, JSON, Avro, Ore, Parquet, and XML.C . The Connector creates and manages its...

February 3, 2024 No Comments READ MORE +

Which security, governance, and data protection features require, at a MINIMUM, the Business Critical edition of Snowflake? (Choose two.)

Which security, governance, and data protection features require, at a MINIMUM, the Business Critical edition of Snowflake? (Choose two.)A . Extended Time Travel (up to 90 days)B . Customer-managed encryption keys through Tri-Secret SecureC . Periodic rekeying of encrypted dataD . AWS, Azure, or Google Cloud private connectivity to SnowflakeE...

February 3, 2024 No Comments READ MORE +

Which feature provides the capability to define an alternate cluster key for a table with an existing cluster key?

Which feature provides the capability to define an alternate cluster key for a table with an existing cluster key?A . External tableB . Materialized viewC . Search optimizationD . Result cacheView AnswerAnswer: B Explanation: A materialized view is a feature that provides the capability to define an alternate cluster key...

February 2, 2024 No Comments READ MORE +

Which approach will meet these requirements if Role-Based Access Policies (RBAC) is a viable option for isolating tenants?

A Snowflake Architect is designing an application and tenancy strategy for an organization where strong legal isolation rules as well as multi-tenancy are requirements. Which approach will meet these requirements if Role-Based Access Policies (RBAC) is a viable option for isolating tenants?A . Create accounts for each tenant in the...

February 2, 2024 No Comments READ MORE +

How does a standard virtual warehouse policy work in Snowflake?

How does a standard virtual warehouse policy work in Snowflake?A . It conserves credits by keeping running clusters fully loaded rather than starting additional clusters.B . It starts only if the system estimates that there is a query load that will keep the cluster busy for at least 6 minutes.C...

February 2, 2024 No Comments READ MORE +

How can this data be shared?

A healthcare company wants to share data with a medical institute. The institute is running a Standard edition of Snowflake; the healthcare company is running a Business Critical edition. How can this data be shared?A . The healthcare company will need to change the institute’s Snowflake edition in the accounts...

February 1, 2024 No Comments READ MORE +

Which of the following are characteristics of how row access policies can be applied to external tables? (Choose three.)

Which of the following are characteristics of how row access policies can be applied to external tables? (Choose three.)A . An external table can be created with a row access policy, and the policy can be applied to the VALUE column.B . A row access policy can be applied to...

February 1, 2024 No Comments READ MORE +

Which of the following are characteristics of Snowflake’s parameter hierarchy?

Which of the following are characteristics of Snowflake’s parameter hierarchy?A . Session parameters override virtual warehouse parameters.B . Virtual warehouse parameters override user parameters.C . Table parameters override virtual warehouse parameters.D . Schema parameters override account parameters.View AnswerAnswer: D Explanation: This is the correct answer because it reflects the characteristics...

February 1, 2024 No Comments READ MORE +

What steps should the Architect take to resolve this error and ensure that the account is accessed using only Private Link?

A company is using a Snowflake account in Azure. The account has SAML SSO set up using ADFS as a SCIM identity provider. To validate Private Link connectivity, an Architect performed the following steps: * Confirmed Private Link URLs are working by logging in with a username/password account * Verified...

February 1, 2024 No Comments READ MORE +