Cof C02

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

COF-C02 Dumps

COF-C02 Braindumps
COF-C02 Real Questions
COF-C02 Practice Test
COF-C02 dumps free

SnowFlake

COF-C02
SnowPro Core Certification

http://killexams.com/pass4sure/exam-detail/COF-C02
Question: 85

Where would a Snowflake user find information about query activity from 90 days ago?
A. account__usage . query history view
B. account__usage.query__history__archive View
C. information__schema . cruery_history view
D. information__schema – query history_by_ses s i on view

Answer: A

Question: 86

Which command is used to unload data from a Snowflake table into a file in a stage?
A. COPY INTO
B. GET
C. WRITE
D. EXTRACT INTO

Answer: A

Explanation:

https://docs.snowflake.com/en/user-guide/data-unload-snowflake.html#:~:text=Your%20User%20Stage-
,Use%20the%20COPY%20
INTO%20command%20to%20unload%20all%20the,more%20files%20in%20your%20stage.

Question: 87

True or False: Loading data into Snowflake requires that source data files be no larger than 16MB.
A. True
B. False

Answer: B

Explanation:

By default, COPY INTO location statements separate table data into a set of output files to take advantage of parallel
operations. The maximum size for each file is set using the MAX_FILE_SIZE copy option. The default value is
16777216 (16 MB) but can be increased to accommodate larger files. The maximum file size supported is 5 GB for
Amazon S3, Google Cloud Storage, or Microsoft Azure stages. To unload data to a single output file (at the potential
cost of decreased performance), specify the SINGLE = true copy option in your statement. You can optionally specify
a name for the file in the path.

Question: 88

Which of the following objects can be shared through secure data sharing?
A. Masking policy
B. Stored procedure
C. Task
D. External table

Answer: D

Explanation:

Secure Data Sharing enables sharing selected objects in a database in your account with other Snowflake accounts.

The following Snowflake database objects can be shared:

Tables

External tables

Secure views

Secure materialized views

Secure UDFs

Snowflake enables the sharing of databases through shares, which are created by data providers and “imported†by
data consumers. https://docs.snowflake.com/en/user-guide/data-sharing-
intro.html#:~:text=Secure%20Data%20Sharing%20enables%20sharing, External%20tables

Question: 89

What are ways to create and manage data shares in Snowflake? (Select TWO)
A. Through the Snowflake web interface (Ul)
B. Through the DATA_SHARE=TRUE parameter
C. Through SQL commands
D. Through the enable__share=true parameter
E. Using the CREATE SHARE AS SELECT * TABLE command

Answer: C,D

Question: 90

Which of the following indicates that it may be appropriate to use a clustering key for a table? (Select TWO).
A. The table contains a column that has very low cardinality
B. DML statements that are being issued against the table are blocked
C. The table has a small number of micro-partitions
D. Queries on the table are running slower than expected
E. The clustering depth for the table is large

Answer: D,E

Question: 91
What is a machine learning and data science partner within the Snowflake Partner Ecosystem?
A. Informatica
B. Power Bl
C. Adobe
D. Data Robot

Answer: D

Explanation:

https://docs.snowflake.com/en/user-guide/ecosystem-analytics.html

Question: 92

Which cache type is used to cache data output from SQL queries?
A. Metadata cache
B. Result cache
C. Remote cache
D. Local file cache

Answer: B

Explanation:

https://community.snowflake.com/s/article/Caching-in-Snowflake-Data-Warehouse

Question: 93

Which of the following describes how clustering keys work in Snowflake?


A. Clustering keys update the micro-partitions in place with a full sort, and impact the DML operations.
B. Clustering keys sort the designated columns over time, without blocking DML operations
C. Clustering keys create a distributed, parallel data structure of pointers to a table’s rows and columns
D. Clustering keys establish a hashed key on each node of a virtual warehouse to optimize joins at run-time

Answer: B

Question: 94

A company’s security audit requires generating a report listing all Snowflake logins (e.g.. date and user) within the last
90 days.

Which of the following statements will return the required information?


A. SELECT LAST_SUCCESS_LOGIN, LOGIN_NAME
FROM ACCOUNT_USAGE.USERS;
B.SELECT EVENT_TIMESTAMP, USER_NAME
FROM table(information_schema.login_history_by_user())
C.SELECT EVENT_TIMESTAMP, USER_NAME
FROM ACCOUNT_USAGE.ACCESS_HISTORY;
D.SELECT EVENT_TIMESTAMP, USER_NAME
FROM ACCOUNT_USAGE.LOGIN_HISTORY;

Answer: D

Question: 95

What are value types that a VARIANT column can store? (Select TWO)
A. STRUCT
B. OBJECT
C. BINARY
D. ARRAY
E. CLOB

Answer: B,D

Explanation:

Characteristics of a VARIANT

A VARIANT can store a value of any other type, including OBJECT and ARRAY. The maximum length of a
VARIANT is 16 MB.

https://docs.snowflake.com/en/sql-reference/data-types-semistructured.html#:~:text=VARIANT-
,Characteristics%20of%20a%20 VARIANT,a%20VARIANT%20is%2016%20MB.

Question: 96

What tasks can be completed using the copy command? (Select TWO)
A. Columns can be aggregated
B. Columns can be joined with an existing table
C. Columns can be reordered
D. Columns can be omitted
E. Data can be loaded without the need to spin up a virtual warehouse

Answer: C,D

Question: 97

What is a best practice after creating a custom role?


A. Create the custom role using the SYSADMIN role.
B. Assign the custom role to the SYSADMIN role
C. Assign the custom role to the PUBLIC role
D. Add_CUSTOM to all custom role names

Answer: B
Explanation:

When creating roles that will serve as the owners of securable objects in the system, Snowflake recommends creating a
hierarchy of custom roles, with the top-most custom role assigned to the system role SYSADMIN. This role structure
allows system administrators to manage all objects in the account, such as warehouses and database objects, while
restricting management of users and roles to the USERADMIN role.

Question: 98

What is a key feature of Snowflake architecture?


A. Zero-copy cloning creates a mirror copy of a database that updates with the original
B. Software updates are automatically applied on a quarterly basis
C. Snowflake eliminates resource contention with its virtual warehouse implementation
D. Multi-cluster warehouses allow users to run a query that spans across multiple clusters
E. Snowflake automatically sorts DATE columns during ingest for fast retrieval by date

Answer: C

Question: 99

What data is stored in the Snowflake storage layer? (Select TWO).


A. Snowflake parameters
B. Micro-partitions
C. Query history
D. Persisted query results
E. Standard and secure view results

Answer: B,D

Question: 100

A sales table FCT_SALES has 100 million records.

The following Query was executed

SELECT COUNT (1) FROM FCT__SALES;

How did Snowflake fulfill this query?


A. Query against the result set cache
B. Query against a virtual warehouse cache
C. Query against the most-recently created micro-partition
D. Query against the metadata excite

Answer: D
For More exams visit https://killexams.com/vendors-exam-list

Kill your exam at First Attempt....Guaranteed!

You might also like