What happens when a cloned table is replicated to a secondary database? (Select TWO)
What happens when a cloned table is replicated to a secondary database? (Select TWO)A . A read-only copy of the cloned tables is stored.B . The replication will not be successful.C . The physical data is replicatedD . Additional costs for storage are charged to a secondary accountE . Metadata...
How did Snowflake fulfill this query?
A sales table FCT_SALES has 100 million records. The following Query was executed SELECT COUNT (1) FROM FCT__SALES; How did Snowflake fulfill this query?A . Query against the result set cacheB . Query against a virtual warehouse cacheC . Query against the most-recently created micro-partitionD . Query against the metadata...
Which statement about billing applies to Snowflake credits?
Which statement about billing applies to Snowflake credits?A . Credits are billed per-minute with a 60-minute minimumB . Credits are used to pay for cloud data storage usageC . Credits are consumed based on the number of credits billed for each hour that a warehouse runsD . Credits are consumed...
Which of the following are best practice recommendations that should be considered when loading data into Snowflake? (Select TWO).
Which of the following are best practice recommendations that should be considered when loading data into Snowflake? (Select TWO).A . Load files that are approximately 25 MB or smaller.B . Remove all dates and timestamps.C . Load files that are approximately 100-250 MB (or larger)D . Avoid using embedded characters...
Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)
Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)A . SCIMB . Federated authenticationC . TLS 1.2D . Key-pair authenticationE . OAuthF . OCSP authenticationView AnswerAnswer: B, D, E Explanation: Snowflake supports several methods for authenticating users, including federated authentication, key-pair authentication, and...
When reviewing a query profile, what is a symptom that a query is too large to fit into the memory?
When reviewing a query profile, what is a symptom that a query is too large to fit into the memory?A . A single join node uses more than 50% of the query timeB . Partitions scanned is equal to partitions totalC . An AggregateOperacor node is presentD . The query...
Which cache type is used to cache data output from SQL queries?
Which cache type is used to cache data output from SQL queries?A . Metadata cacheB . Result cacheC . Remote cacheD . Local file cacheView AnswerAnswer: B Explanation: The Result cache is used in Snowflake to cache the data output from SQL queries. This feature is designed to improve performance...
True or False: Fail-safe can be disabled within a Snowflake account.
True or False: Fail-safe can be disabled within a Snowflake account.A . TrueB . FalseView AnswerAnswer: B Explanation: Reference: https://docs.snowflake.com/en/user-guide/data-failsafe.html Separate and distinct from Time Travel, Fail-safe ensures historical data is protected in the event of a system failure or other catastrophic event, e.g. a hardware failure or security breach....
What features does Snowflake Time Travel enable?
What features does Snowflake Time Travel enable?A . Querying data-related objects that were created within the past 365 daysB . Restoring data-related objects that have been deleted within the past 90 daysC . Conducting point-in-time analysis for Bl reportingD . Analyzing data usage/manipulation over all periods of timeView AnswerAnswer: B,...
How would you determine the size of the virtual warehouse used for a task?
How would you determine the size of the virtual warehouse used for a task?A . Root task may be executed concurrently (i.e. multiple instances), it is recommended to leave some margins in the execution window to avoid missing instances of executionB . Querying (select) the size of the stream content...