ARA-C01 Practice Questions
168 real ARA-C01 exam questions with expert-verified answers and explanations. Page 1 of 4.
- Question #1Performance Optimization
Which steps are recommended best practices for prioritizing cluster keys in Snowflake? (Choose two.)
Clustering KeysPerformance OptimizationMicro-partition PruningSnowflake Best Practices - Question #2Data Modeling and Design
Which Snowflake data modeling approach is designed for BI queries?
Data ModelingStar SchemaBI QueriesDimensional Modeling - Question #3Data Integration and Pipelines
How is the change of local time due to daylight savings time handled in Snowflake tasks? (Choose two.)
Snowflake TasksTask SchedulingDaylight Saving TimeTime Zones - Question #4Security and Compliance
An Architect needs to grant a group of ORDER_ADMIN users the ability to clean old data in an ORDERS table (deleting all records older than 5 years), without granting any privileges...
Stored ProceduresOwner's RightsAccess ControlPrivilege Delegation - Question #5Performance Optimization
A company's daily Snowflake workload consists of a huge number of concurrent queries triggered between 9pm and 11pm. At the individual level, these queries are smaller statements t...
Virtual WarehousesConcurrency ControlPerformance TuningMulti-cluster Warehouses - Question #6Performance Optimization
Which system functions does Snowflake provide to monitor clustering information within a table (Choose two.)
ClusteringSystem FunctionsPerformance MonitoringTable Optimization - Question #7Data Engineering
A company has a table with that has corrupted data, named Data. The company wants to recover the data as it was 5 minutes ago using cloning and Time Travel. What command will accom...
Time TravelTable CloningData RecoverySQL Syntax - Question #8Data Governance and Data Sharing
A company has an inbound share set up with eight tables and five secure views. The company plans to make the share part of its production data pipelines. Which actions can the comp...
Data SharingData ConsumersCloningViews - Question #9Data Integration and Pipelines
A company has several sites in different regions from which the company wants to ingest data. Which of the following will enable this type of data ingestion?
Data IngestionStorage IntegrationExternal StagesMulti-Region Data Loading - Question #10Data Modeling and Design
What Snowflake features should be leveraged when modeling using Data Vault?
Data Vault ModelingMulti-table InsertsData Loading Patterns - Question #11Security and Compliance
A company's client application supports multiple authentication methods, and is using Okta. What is the best practice recommendation for the order of priority when applications aut...
AuthenticationOAuthExternal OAuthSecurity Best Practices - Question #12Snowflake Architecture
What is a valid object hierarchy when building a Snowflake environment?
Snowflake architectureObject hierarchyData organizationCore concepts - Question #13Snowflake Architecture
Which of the following are characteristics of Snowflake's parameter hierarchy?
Parameter HierarchyConfiguration ManagementVirtual WarehousesUser Parameters - Question #14Architectural Principles and Best Practices
A Snowflake Architect is designing a multi-tenant application strategy for an organization in the Snowflake Data Cloud and is considering using an Account Per Tenant strategy. Whic...
Multi-tenancyAccount Per TenantArchitectural PatternsSecurity Isolation - Question #15Snowflake Architecture
An Architect has been asked to clone schema STAGING as it looked one week ago, Tuesday June 1st at 8:00 AM, to recover some objects. The STAGING schema has 50 days of retention. Th...
Time TravelCloningSchema ManagementObject Lifecycle - Question #16Data Integration and Pipelines
What are purposes for creating a storage integration? (Choose three.)
Storage IntegrationExternal StageIAMData Ingestion Security - Question #17Security and Compliance
A healthcare company is deploying a Snowflake account that may include Personal Health Information (PHI). The company must ensure compliance with all relevant privacy standards. Wh...
Dynamic Data MaskingExternal TokenizationSnowflake EditionsPHI Compliance - Question #18Accounts and Security
There are two databases in an account, named fin_db and hr_db which contain payroll and employee data, respectively. Accountants and Analysts in the company require different permi...
RBACPermissionsAccess ControlSnowflake Security - Question #19Data Engineering
An Architect runs the following SQL query: How can this query be interpreted?
StagesData LoadingFile MetadataData Ingestion - Question #20Accounts and Security
An Architect entered the following commands in sequence: USER1 cannot find the table. Which of the following commands does the Architect need to run for USER1 to find the tables us...
Snowflake PrivilegesRole-Based Access ControlLeast PrivilegeData Access - Question #21Snowflake Architecture
A DevOps team has a requirement for recovery of staging tables used in a complex set of data pipelines. The staging tables are all located in the same staging schema. One of the re...
Time TravelData RetentionTransient TablesParameter Precedence - Question #22Data Engineering
Consider the following COPY command which is loading data with CSV format into a Snowflake table from an internal stage through a data transformation query. This command results in...
COPY INTOVALIDATION_MODEData LoadingData Transformation - Question #23Data Integration and Pipelines
A company is storing large numbers of small JSON files (ranging from 1-4 bytes) that are received from IoT devices and sent to a cloud provider. In any given hour, 100,000 files ar...
SnowpipeData IngestionCost OptimizationIoT Data - Question #24Data Governance and Data Sharing
A company has a Snowflake account named ACCOUNTA in AWS us-east-1 region. The company stores its marketing data in a Snowflake database named MARKET_DB. One of the company's busine...
Data SharingCross-cloud sharingDatabase ReplicationSnowflake Accounts - Question #25Cost Optimization
You are a snowflake architect in an organization. The business team came to to deploy an use case which requires you to load some data which they can visualize through tableau. Eve...
Snowflake table typesCost optimizationData retentionTransient tables - Question #26Snowflake Architecture
Following objects can be cloned in snowflake
Zero-copy cloningSnowflake objectsTable typesData management - Question #27Data Engineering
When loading data from stage using COPY INTO, what options can you specify for the ON_ERROR clause?
COPY INTOData LoadingError HandlingStages - Question #28Cost Optimization
Which of the below commands will use warehouse credits?
Warehouse CreditsVirtual WarehouseCredit ConsumptionMetadata Queries - Question #29Data Integration and Pipelines
What does a Snowflake Architect need to consider when implementing a Snowflake Connector for Kafka?
Snowflake Kafka ConnectorData IngestionPipesTable Creation - Question #30Data Governance and Data Sharing
A group of Data Analysts have been granted the role analyst role. They need a Snowflake database where they can create and modify tables, views, and other objects to load with thei...
Access ControlManaged Access SchemasRoles and PrivilegesData Security - Question #31Data Engineering
What considerations need to be taken when using database cloning as a tool for data lifecycle management in a development environment? (Select TWO).
Database CloningSnowflake PipesData Lifecycle ManagementDevelopment Environments - Question #32Data Modeling and Design
Which columns can be included in an external table schema? (Select THREE).
External TablesSchema DesignPseudo-columnsMetadata - Question #34Data Engineering
An Architect clones a database and all of its objects, including tasks. After the cloning, the tasks stop running. Why is this occurring?
CloningTasksDatabase ManagementDefault Behavior - Question #35Data Governance and Data Sharing
Is it possible for a data provider account with a Snowflake Business Critical edition to share data with an Enterprise edition data consumer account?
Data SharingSnowflake EditionsProvider/Consumer AccountsAccount Capabilities - Question #36Data Engineering
Which of the following ingestion methods can be used to load near real-time data by using the messaging services provided by a cloud provider?
Snowflake Connector for KafkaReal-time data ingestionMessaging servicesData pipelines - Question #37Data Integration and Pipelines
An Architect is designing a file ingestion recovery solution. The project will use an internal named stage for file storage. Currently, in the case of an ingestion failure, the Ope...
Internal StagesSnowSQL CLIOperational OverheadFile Download - Question #38Performance Optimization
A table for IOT devices that measures water usage is created. The table quickly becomes large and contains more than 2 billion rows. The general query patterns for the table are: 1...
Clustering KeysPerformance OptimizationQuery OptimizationData Modeling - Question #39Data Governance and Data Sharing
Which Snowflake objects can be used in a data share? (Select TWO).
Data SharingSnowflake ObjectsShareable ObjectsSecure View - Question #40Data Integration and Pipelines
A company has an external vendor who puts data into Google Cloud Storage. The company's Snowflake account is set up in Azure. What would be the MOST efficient way to load data from...
Snowflake External StageData LoadingGCP IntegrationMulti-cloud Data Ingestion - Question #41Data Integration and Pipelines
How can the Snowpipe REST API be used to keep a log of data load history?
SnowpipeREST APIData LoadingLoad History - Question #42Data Integration and Pipelines
The diagram shows the process flow for Snowpipe auto-ingest with Amazon Simple Notification Service (SNS) with the following steps: Step 1: Data files are loaded in a stage. Step 2...
SnowpipeAuto-ingestAWS SNSAWS SQS - Question #43Data Integration and Pipelines
An Architect needs to meet a company requirement to ingest files from the company's AWS storage accounts into the company's Snowflake Google Cloud Platform (GCP) account. How can t...
SnowpipeData IngestionAWS IntegrationREST API - Question #44Security and Compliance
When activating Tri-Secret Secure in a hierarchical encryption model in a Snowflake account, at what level is the customer-managed key used?
Tri-Secret SecureCustomer-Managed Keys (CMK)Encryption HierarchyAccount Master Key (AMK) - Question #45Snowflake Architecture
What are characteristics of the use of transactions in Snowflake? (Select TWO).
Snowflake TransactionsTransaction Control Language (TCL)DDL in Transactions - Question #47Architectural Principles and Best Practices
A company is designing high availability and disaster recovery plans and needs to maximize redundancy and minimize recovery time objectives for their critical application processes...
High AvailabilityDisaster RecoveryClient RedirectCross-Cloud Replication - Question #48Data Governance and Data Sharing
A company's Architect needs to find an efficient way to get data from an external partner, who is also a Snowflake user. The current solution is based on daily JSON extracts that a...
Data SharingExternal PartnersData IntegrationEfficiency - Question #50Data Modeling and Design
Why might a Snowflake Architect use a star schema model rather than a 3NF model when designing a data architecture to run in Snowflake? (Select TWO).
Data ModelingStar SchemaDimensional ModelingBI Tools - Question #51Performance Optimization
An Architect is troubleshooting a query with poor performance using the QUERY_HIST0RY function. The Architect observes that the COMPILATIONJHME is greater than the EXECUTIONJTIME....
Query performanceTroubleshootingQuery compilationPerformance metrics - Question #52Architectural Principles and Best Practices
A Snowflake Architect is designing a multiple-account design strategy. This strategy will be MOST cost-effective with which scenarios? (Select TWO).
Multi-Account StrategyCost OptimizationSecurity ComplianceIdentity Management - Question #53Data Governance and Data Sharing
The following table exists in the production database: A regulatory requirement states that the company must mask the username for events that are older than six months based on th...
Masking PolicyDynamic Data MaskingConditional MaskingData Security