COF-C02 Exam Questions

Total 498 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam pool A

Which of the following objects can be shared through secure data sharing?


A.

Masking policy


B.

Stored procedure


C.

Task


D.

External table





D.
  

External table



Secure Data Sharing enables sharing selected objects in a database in your account with other Snowflake accounts. The following Snowflake database objects can be shared:

  • Tables
  • External tables
  • Secure views
  • Secure materialized views
  • Secure UDFs


Snowflake enables the sharing of databases through shares, which are created by data providers and “imported” by data consumers.

In which scenarios would a user have to pay Cloud Services costs? (Select TWO).


A.

Compute Credits = 50 Credits Cloud Services = 10


B.

Compute Credits = 80 Credits Cloud Services = 5


C.

Compute Credits = 10 Credits Cloud Services = 9


D.

Compute Credits = 120 Credits Cloud Services = 10


E.

Compute Credits = 200 Credits Cloud Services = 26





B.
  

Compute Credits = 80 Credits Cloud Services = 5



D.
  

Compute Credits = 120 Credits Cloud Services = 10



What happens when a cloned table is replicated to a secondary database? (Select TWO)


A.

A read-only copy of the cloned tables is stored.


B.

The replication will not be successful.


C.

The physical data is replicated


D.

Additional costs for storage are charged to a secondary account


E.

Metadata pointers to cloned tables are replicated





C.
  

The physical data is replicated



D.
  

Additional costs for storage are charged to a secondary account



Cloned objects are replicated physically rather than logically to secondary databases. That is, cloned tables in a standard database do not contribute to the overall data storage unless or until DML operations on the clone add to or modify existing data. However, when a cloned table is replicated to a secondary database, the physical data is also replicated, increasing the data storage usage for your account.

 

https://docs.snowflake.com/en/user-guide/database-replicationconsiderations.
html#:~:text=Replication-and-Cloning,-Cloned-objects-are&text=However%2C-when-a-cloned-table,storage-usage-for-your-account.

Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)


A.

SCIM


B.

Federated authentication


C.

TLS 1.2


D.

Key-pair authentication


E.

OAuth


F.

OCSP authentication





B.
  

Federated authentication



D.
  

Key-pair authentication



E.
  

OAuth



True or False: Fail-safe can be disabled within a Snowflake account.


A.

True


B.

True





B.
  

True



https://docs.snowflake.com/en/user-guide/data-failsafe.html


Separate and distinct from Time Travel, Fail-safe ensures historical data is protected in the event of a system failure or other catastrophic event, e.g. a hardware failure or security breach. Fail safe feature cannot be enabled or disabled from the user end .

Which of the following Snowflake capabilities are available in all Snowflake editions? (Select TWO)


A.

Customer-managed encryption keys through Tri-Secret Secure


B.

Automatic encryption of all data


C.

Up to 90 days of data recovery through Time Travel


D.

Object-level access control


E.

Column-level security to apply data masking policies to tables and views





B.
  

Automatic encryption of all data



D.
  

Object-level access control



Which command can be used to stage local files from which Snowflake interface?


A.

SnowSQL


B.

Snowflake classic web interface (Ul)


C.

Snowsight


D.

.NET driver





A.
  

SnowSQL



Explanation: https://docs.snowflake.com/en/user-guide/snowsql-use.html

What SQL command would be used to view all roles that were granted to user.1?


A.

show grants to user USER1;


B.

show grants of user USER1;


C.

describe user USER1;


D.

show grants on user USER1;





A.
  

show grants to user USER1;



How often are encryption keys automatically rotated by Snowflake?


A.

30 Days


B.

60 Days


C.

90 Days


D.

365 Days





A.
  

30 Days



All Snowflake-managed keys are automatically rotated by Snowflake when they are more than 30 days old. Active keys are retired, and new keys are created. When Snowflake determines the retired key is no longer needed, the key is automatically destroyed.

https://docs.snowflake.com/en/user-guide/security-encryptionmanage.
html#:~:text=All-Snowflake%2Dmanaged-keys-are,the-key-is%
20automatically-destroyed.

A user is loading JSON documents composed of a huge array containing multiple records into Snowflake. The user enables the strip__outer_array file format option What does the STRIP_OUTER_ARRAY file format do?


A.

It removes the last element of the outer array.


B.

It removes the outer array structure and loads the records into separate table rows,


C.

It removes the trailing spaces in the last element of the outer array and loads the
records into separate table columns


D.

It removes the NULL elements from the JSON object eliminating invalid data and enables the ability to load the records





B.
  

It removes the outer array structure and loads the records into separate table rows,



Data Size Limitations
The VARIANT data type imposes a 16 MB size limit on individual rows. For some semi-structured data formats (e.g. JSON), data sets are frequently a simple concatenation of multiple documents. The JSON output from some software is composed of a single huge array containing multiple records. There is no need to separate the documents with line breaks or commas, though both are supported. If the data exceeds 16 MB, enable the STRIP_OUTER_ARRAY file format option for the COPY INTO <table> command to remove the outer array structure and load the records into separate table rows:

copy into <table>
from @~/<file>.json
file_format = (type = 'JSON' strip_outer_array = true);
https://docs.snowflake.com/en/user-guide/semistructured-considerations.html


Page 4 out of 50 Pages
Previous