Free SnowPro Advanced Architect Exam Braindumps (page: 5)

Page 4 of 17

An Architect has a VPN_ACCESS_LOGS table in the SECURITY_LOGS schema containing timestamps of the connection and disconnection, username of the user, and summary statistics. What should the Architect do to enable the Snowflake search optimization service on this table?

  1. Assume role with OWNERSHIP on future tables and ADD SEARCH OPTIMIZATION on the SECURITY_LOGS schema.
  2. Assume role with ALL PRIVILEGES including ADD SEARCH OPTIMIZATION in the SECURITY LOGS schema.
  3. Assume role with OWNERSHIP on VPN_ACCESS_LOGS and ADD SEARCH OPTIMIZATION in the SECURITY_LOGS schema.
  4. Assume role with ALL PRIVILEGES on VPN_ACCESS_LOGS and ADD SEARCH OPTIMIZATION in the SECURITY_LOGS schema.

Answer(s): C



A table contains five columns and it has millions of records. The cardinality distribution of the columns is shown below:



Column C4 and C5 are mostly used by SELECT queries in the GROUP BY and ORDER BY clauses. Whereas columns C1, C2 and C3 are heavily used in filter and join conditions of SELECT queries. The Architect must design a clustering key for this table to improve the query performance.
Based on Snowflake recommendations, how should the clustering key columns be ordered while defining the multi-column clustering key?

  1. C5, C4, C2
  2. C3, C4, C5
  3. C1, C3, C2
  4. C2, C1, C3

Answer(s): D



Which security, governance, and data protection features require, at a MINIMUM, the Business Critical edition of Snowflake? (Choose two.)

  1. Extended Time Travel (up to 90 days)
  2. Customer-managed encryption keys through Tri-Secret Secure
  3. Periodic rekeying of encrypted data
  4. AWS, Azure, or Google Cloud private connectivity to Snowflake
  5. Federated authentication and SSO

Answer(s): B,D



A company wants to deploy its Snowflake accounts inside its corporate network with no visibility on the internet. The company is using a VPN infrastructure and Virtual Desktop Infrastructure (VDI) for its Snowflake users. The company also wants to re-use the login credentials set up for the VDI to eliminate redundancy when managing logins.
What Snowflake functionality should be used to meet these requirements? (Choose two.)

  1. Set up replication to allow users to connect from outside the company VPN.
  2. Provision a unique company Tri-Secret Secure key.
  3. Use private connectivity from a cloud provider.
  4. Set up SSO for federated authentication.
  5. Use a proxy Snowflake account outside the VPN, enabling client redirect for user logins.

Answer(s): B,E






Post your Comments and Discuss Snowflake SnowPro Advanced Architect exam with other Community members:

SnowPro Advanced Architect Discussions & Posts