Which of the following describes a Snowflake stored procedure?
A. They can be created as secure and hide the underlying metadata from the user.
B. They can only access tables from a single database.
C. They can contain only a single SQL statement.
D. They can be created to run with a caller's rights or an owner's rights.
Where is Snowflake metadata stored?
A. Within the data files
B. In the virtual warehouse layer
C. In the cloud services layer
D. In the remote storage layer
Which command sets the Virtual Warehouse for a session?
A. COPY WAREHOUSE FROM <
B. SET WAREHOUSE = <
C. USE WAREHOUSE <
D. USE VIRTUAL_WAREHOUSE <
Which statements are true concerning Snowflake's underlying cloud infrastructure? (Select THREE),
A. Snowflake data and services are deployed in a single availability zone within a cloud provider's region.
B. Snowflake data and services are available in a single cloud provider and a single region, the use of multiple cloud providers is not supported.
C. Snowflake can be deployed in a customer's private cloud using the customer's own compute and storage resources for Snowflake compute and storage
D. Snowflake uses the core compute and storage services of each cloud provider for its own compute and storage
E. All three layers of Snowflake's architecture (storage, compute, and cloud services) are deployed and managed entirely on a selected cloud platform
F. Snowflake data and services are deployed in at least three availability zones within a cloud provider's region
Which of the following describes the Snowflake Cloud Services layer?
A. Coordinates activities in the Snowflake account
B. Executes queries submitted by the Snowflake account users
C. Manages quotas on the Snowflake account storage
D. Manages the virtual warehouse cache to speed up queries
Which Snowflake feature allows a user to substitute a randomly generated identifier for sensitive data, in order to prevent unauthorized users access to the data, before loading it into Snowflake?
A. External Tokenization
B. External Tables
C. Materialized Views
D. User-Defined Table Functions (UDTF)
Which of the following objects can be directly restored using the UNDROP command? (Choose two.)
A. Schema
B. View
C. Internal stage
D. Table
E. User
F. Role
Which snowflake objects will incur both storage and cloud compute charges? (Select TWO)
A. Materialized view
B. Sequence
C. Secure view
D. Transient table
E. Clustered table
Which privilege must be granted to a share to allow secure views the ability to reference data in multiple databases?
A. CREATE_SHARE on the account
B. SHARE on databases and schemas
C. SELECT on tables used by the secure view
D. REFERENCE_USAGE on databases
Users are responsible for data storage costs until what occurs?
A. Data expires from Time Travel
B. Data expires from Fail-safe
C. Data is deleted from a table
D. Data is truncated from a table
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Snowflake exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SNOWPRO-CORE exam preparations and Snowflake certification application, do not hesitate to visit our Vcedump.com to find your solutions here.