What built-in Snowflake features make use of the change tracking metadata for a table? (Choose two.)
What built-in Snowflake features make use of the change tracking metadata for a table? (Choose two.)A . The MERGE commandB . The UPSERT commandC . The CHANGES clauseD . A STREAM objectE . The CHANGE_DATA_CAPTURE commandView AnswerAnswer: C, D Explanation: The built-in Snowflake features that make use of the change...
How do Snowflake databases that are created from shares differ from standard databases that are not created from shares? (Choose three.)
How do Snowflake databases that are created from shares differ from standard databases that are not created from shares? (Choose three.)A . Shared databases are read-only.B . Shared databases must be refreshed in order for new data to be visible.C . Shared databases cannot be cloned.D . Shared databases are...
What are the MINIMUM object privileges required for the Snowpipe user to execute Snowpipe?
A Data Engineer is designing a near real-time ingestion pipeline for a retail company to ingest event logs into Snowflake to derive insights. A Snowflake Architect is asked to define security best practices to configure access control privileges for the data load for auto-ingest to Snowpipe. What are the MINIMUM...
Which statements describe characteristics of the use of materialized views in Snowflake? (Choose two.)
Which statements describe characteristics of the use of materialized views in Snowflake? (Choose two.)A . They can include ORDER BY clauses.B . They cannot include nested subqueries.C . They can include context functions, such as CURRENT_TIME().D . They can support MIN and MAX aggregates.E . They can support inner joins,...
What command will accomplish this?
A company has a table with that has corrupted data, named Data. The company wants to recover the data as it was 5 minutes ago using cloning and Time Travel. What command will accomplish this?A . CREATE CLONE TABLE Recover_Data FROM Data AT(OFFSET => -60*5);B . CREATE CLONE Recover_Data FROM...
How can a Snowflake Architect meet this requirement with the LEAST amount of coding?
Files arrive in an external stage every 10 seconds from a proprietary system. The files range in size from 500 K to 3 MB. The data must be accessible by dashboards as soon as it arrives. How can a Snowflake Architect meet this requirement with the LEAST amount of coding?...
Which of the following is recommended for optimizing the cost associated with the Snowflake Kafka connector?
An Architect is designing a pipeline to stream event data into Snowflake using the Snowflake Kafka connector. The Architect’s highest priority is to configure the connector to stream data in the MOST cost-effective manner. Which of the following is recommended for optimizing the cost associated with the Snowflake Kafka connector?A...
What is the BEST way to find recent and ongoing login attempts to Snowflake?
The IT Security team has identified that there is an ongoing credential stuffing attack on many of their organization’s system. What is the BEST way to find recent and ongoing login attempts to Snowflake?A . Call the LOGIN_HISTORY Information Schema table function.B . Query the LOGIN_HISTORY view in the ACCOUNT_USAGE...
When using the Snowflake Connector for Kafka, what data formats are supported for the messages? (Choose two.)
When using the Snowflake Connector for Kafka, what data formats are supported for the messages? (Choose two.)A . CSVB . XMLC . AvroD . JSONE . ParquetView AnswerAnswer: C, D Explanation: The data formats that are supported for the messages when using the Snowflake Connector for Kafka are Avro and...
At which object type level can the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY privileges be granted?
At which object type level can the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY privileges be granted?A . GlobalB . DatabaseC . SchemaD . TableView AnswerAnswer: A Explanation: The object type level at which the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY...