What can the Snowflake SCIM API be used to manage? (Select TWO).
The Snowflake SCIM (System for Cross-domain Identity Management) API is used for automated user and role management. It enables integration with identity providers (IdPs) for the provisioning and deprovisioning of user accounts and roles in Snowflake. This helps in managing access control and permissions systematically and aligns with identity governance practices.
Snowflake Documentation: Managing Users and Roles with SCIM API
Which Query Profile metrics will provide information that can be used to improve query performance? (Select TWO).
Two key metrics in Snowflake's Query Profile that provide insights for performance improvement are:
Remote Disk IO: This measures the time the query spends waiting on remote disk access, indicating potential performance issues related to I/O bottlenecks.
Pruning: This metric reflects how effectively Snowflake's micro-partition pruning is reducing the data scanned. Better pruning (more partitions excluded) leads to faster query performance, as fewer micro-partitions need to be processed.
These metrics are essential for identifying and addressing inefficiencies in data retrieval and storage access, optimizing overall query performance.
Use of which file function allows a user to share unstructured data from an internal stage with an external reporting tool that does not have access to Snowflake">
The GET_PRESIGNED_URL function in Snowflake generates a pre-signed URL for a file in an internal stage. This URL can be shared with external tools or users who do not have direct access to Snowflake, allowing them to download the file.
Generate Pre-Signed URL:
SELECT GET_PRESIGNED_URL(@my_stage/file.txt);
Share the URL: The generated URL can be shared with external users or applications, enabling them to access the file directly.
Snowflake Documentation: GET_PRESIGNED_URL
Snowflake Documentation: Working with Stages
How can a data provider validate that a secure view is configured to display only the data the provider wishes to expose?
The most effective way for a data provider to validate secure view configurations is to create a data share for a test data consumer account. This method allows the provider to review and confirm that only the intended data is accessible in the secure view. Secure views are designed to mask or restrict data visibility, so creating a test share replicates the consumer's experience and ensures data security before sharing with actual consumers.
Which command should be used to assign a key to a Snowflake user who needs to connect using key pair authentication?
Josphine
4 days agoRosamond
5 days agoJustine
10 days agoTeddy
20 days agoSalena
1 months agoKirk
1 months agoReuben
1 months agoErnestine
2 months agoTeri
2 months agoLeslee
2 months agoNoah
2 months agoChristoper
2 months agoJade
3 months agoTess
3 months agoDarrin
3 months agoVeta
3 months agoJacqueline
3 months agoNatalie
4 months agoLatia
4 months agoBethanie
4 months agoGlennis
4 months agoElliott
4 months agoTaryn
5 months agoRaina
5 months agoCarlee
5 months agoQueen
5 months agoEssie
6 months agoEdelmira
7 months agoMelita
7 months agoAnnabelle
7 months agoParis
8 months agoEllen
8 months agoGladys
8 months agoTamie
8 months agoKlassens
10 months ago