Question 6

The following table exists in the production database:
A regulatory requirement states that the company must mask the username for events that are older than six months based on the current date when the data is queried.
How can the requirement be met without duplicating the event data and making sure it is applied when creating views using the table or cloning the table?
  • Question 7

    A new table and streams are created with the following commands:
    CREATE OR REPLACE TABLE LETTERS (ID INT, LETTER STRING) ;
    CREATE OR REPLACE STREAM STREAM_1 ON TABLE LETTERS;
    CREATE OR REPLACE STREAM STREAM_2 ON TABLE LETTERS APPEND_ONLY = TRUE;
    The following operations are processed on the newly created table:
    INSERT INTO LETTERS VALUES (1, 'A');
    INSERT INTO LETTERS VALUES (2, 'B');
    INSERT INTO LETTERS VALUES (3, 'C');
    TRUNCATE TABLE LETTERS;
    INSERT INTO LETTERS VALUES (4, 'D');
    INSERT INTO LETTERS VALUES (5, 'E');
    INSERT INTO LETTERS VALUES (6, 'F');
    DELETE FROM LETTERS WHERE ID = 6;
    What would be the output of the following SQL commands, in order?
    SELECT COUNT (*) FROM STREAM_1;
    SELECT COUNT (*) FROM STREAM_2;
  • Question 8

    Bytes spilled to remote storage in query profile indicates volume of data spilled to remote disk
  • Question 9

    A company wants to deploy its Snowflake accounts inside its corporate network with no visibility on the internet. The company is using a VPN infrastructure and Virtual Desktop Infrastructure (VDI) for its Snowflake users. The company also wants to re-use the login credentials set up for the VDI to eliminate redundancy when managing logins.
    What Snowflake functionality should be used to meet these requirements? (Choose two.)
  • Question 10

    An Architect is using SnowCD to investigate a connectivity issue.
    Which system function will provide a list of endpoints that the network must be able to access to use a specific Snowflake account, leveraging private connectivity?