SnowPro Core Certification Exam
Last Update Oct 16, 2025
Total Questions : 605
We are offering FREE SnowPro-Core Snowflake exam questions. All you do is to just go and sign up. Give your details, prepare SnowPro-Core free exam questions and then go for complete pool of SnowPro Core Certification Exam test questions that will help you more.
Which statement about billing applies to Snowflake credits?
A.
Credits are billed per-minute with a 60-minute minimum
B.
Credits are used to pay for cloud data storage usage
C.
Credits are consumed based on the number of credits billed for each hour that a warehouse runs
D.
Credits are consumed based on the warehouse size and the time the warehouse is running
What SQL command would be used to view all roles that were granted to user.1?
A.
show grants to user USER1;
B.
show grants of user USER1;
C.
describe user USER1;
D.
show grants on user USER1;
What is a best practice after creating a custom role?
A.
Create the custom role using the SYSADMIN role.
B.
Assign the custom role to the SYSADMIN role
C.
Assign the custom role to the PUBLIC role
D.
Add__CUSTOM to all custom role names
Which of the following objects can be shared through secure data sharing?
A.
Masking policy
B.
Stored procedure
C.
Task
D.
External table
A company strongly encourages all Snowflake users to self-enroll in Snowflake's default Multi-Factor Authentication (MFA) service to provide increased login security for users connecting to Snowflake.
Which application will the Snowflake users need to install on their devices in order to connect with MFA?
A.
Okta Verify
B.
Duo Mobile
C.
Microsoft Authenticator
D.
Google Authenticator
True or False: Loading data into Snowflake requires that source data files be no larger than 16MB.
A.
True
B.
False
Which of the following describes external functions in Snowflake?
A.
They are a type of User-defined Function (UDF).
B.
They contain their own SQL code.
C.
They call code that is stored inside of Snowflake.
D.
They can return multiple rows for each row received
What happens when a cloned table is replicated to a secondary database? (Select TWO)
A.
A read-only copy of the cloned tables is stored.
B.
The replication will not be successful.
C.
The physical data is replicated
D.
Additional costs for storage are charged to a secondary account
E.
Metadata pointers to cloned tables are replicated
When a cloned table is replicated to a secondary database in Snowflake, the following occurs:
It’s important to note that while the physical data and metadata are replicated, the secondary database is typically read-only and cannot be used for write operations. Additionally, while there may be additional storage costs associated with the secondary account, this is not a direct result of the replication process but rather a consequence of storing additional data.
References:
When using the ALLOW CLIENT_MFA_CACHING parameter, how long is a cached Multi-Factor Authentication (MFA) token valid for?
A.
1 hour
B.
2 hours
C.
4 hours
D.
8 hours
What factors impact storage costs in Snowflake? (Select TWO).
A.
The account type
B.
The storage file format
C.
The cloud region used by the account
D.
The type of data being stored
E.
The cloud platform being used
The factors that impact storage costs in Snowflake include the account type (Capacity or On Demand) and the cloud region used by the account. These factors determine the rate at which storage is billed, with different regions potentially having different rates3.
A tag object has been assigned to a table (TABLE_A) in a schema within a Snowflake database.
Which CREATE object statement will automatically assign the TABLE_A tag to a target object?
A.
CREATE TABLE
B.
CREATE VIEW
C.
CREATE TABLE
D.
CREATE MATERIALIZED VIEW
When enabling access to unstructured data, which URL permits temporary access to a staged file without the need to grant privileges to the stage or to issue access tokens?
A.
File URL
B.
Scoped URL
C.
Relative URL
D.
Pre-Signed URL
What step can reduce data spilling in Snowflake?
A.
Using a larger virtual warehouse
B.
Increasing the virtual warehouse maximum timeout limit
C.
Increasing the amount of remote storage for the virtual warehouse
D.
Using a common table expression (CTE) instead of a temporary table
Which statistics are displayed in a Query Profile that indicate that intermediate results do not fit in memory? (Select TWO).
A.
Bytes scanned
B.
Partitions scanned
C.
Bytes spilled to local storage
D.
Bytes spilled to remote storage
E.
Percentage scanned from cache
The Query Profile statistics that indicate intermediate results do not fit in memory are the bytes spilled to local storage and bytes spilled to remote storage2.
What does a masking policy consist of in Snowflake?
A.
A single data type, with one or more conditions, and one or more masking functions
B.
A single data type, with only one condition, and only one masking function
C.
Multiple data types, with only one condition, and one or more masking functions
D.
Multiple data types, with one or more conditions, and one or more masking functions
A JSON file, that contains lots of dates and arrays, needs to be processed in Snowflake. The user wants to ensure optimal performance while querying the data.
How can this be achieved?
A.
Flatten the data and store it in structured data types in a flattened table. Query the table.
B.
Store the data in a table with a variant data type. Query the table.
C.
Store the data in a table with a vai : ant data type and include STRIP_NULL_VALUES while loading the table. Query the table.
D.
Store the data in an external stage and create views on top of it. Query the views.
What are the least privileges needed to view and modify resource monitors? (Select TWO).
A.
SELECT
B.
OWNERSHIP
C.
MONITOR
D.
MODIFY
E.
USAGE
To view and modify resource monitors, the least privileges needed are MONITOR and MODIFY. These privileges allow a user to monitor credit usage and make changes to resource monitors3.
Which commands are restricted in owner's rights stored procedures? (Select TWO).
A.
SHOW
B.
MERGE
C.
INSERT
D.
DELETE
E.
DESCRIBE
In owner’s rights stored procedures, certain commands are restricted to maintain security and integrity. The SHOW and DESCRIBE commands are limited because they can reveal metadata and structure information that may not be intended for all roles.
Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)
A.
INTEGER
B.
OBJECT
C.
VARIANT
D.
VARCHAR
E.
LIST
The Snowflake data types that can be used to build nested hierarchical data are OBJECT and VARIANT. These data types support the storage and querying of semi-structured data, allowing for the creation of complex, nested data structures
What feature of Snowflake Continuous Data Protection can be used for maintenance of historical data?
A.
Access control
B.
Fail-safe
C.
Network policies
D.
Time Travel
Which Snowflake feature provides increased login security for users connecting to Snowflake that is powered by Duo Security service?
A.
OAuth
B.
Network policies
C.
Single Sign-On (SSO)
D.
Multi-Factor Authentication (MFA)
What metadata does Snowflake store for rows in micro-partitions? (Select TWO).
A.
Range of values
B.
Distinct values
C.
Index values
D.
Sorted values
E.
Null values
Snowflake stores metadata for rows in micro-partitions, including the range of values for each column and the number of distinct values1.
How is unstructured data retrieved from data storage?
A.
SQL functions like the GET command can be used to copy the unstructured data to a location on the client.
B.
SQL functions can be used to create different types of URLs pointing to the unstructured data. These URLs can be used to download the data to a client.
C.
SQL functions can be used to retrieve the data from the query results cache. When the query results are output to a client, the unstructured data will be output to the client as files.
D.
SQL functions can call on different web extensions designed to display different types of files as a web page. The web extensions will allow the files to be downloaded to the client.
A column named "Data" contains VARIANT data and stores values as follows:
How will Snowflake extract the employee's name from the column data?
A.
Data:employee.name
B.
DATA:employee.name
C.
data:Employee.name
D.
data:employee.name
Which statistics can be used to identify queries that have inefficient pruning? (Select TWO).
A.
Bytes scanned
B.
Bytes written to result
C.
Partitions scanned
D.
Partitions total
E.
Percentage scanned from cache
The statistics that can be used to identify queries with inefficient pruning are ‘Partitions scanned’ and ‘Partitions total’. These statistics indicate how much of the data was actually needed and scanned versus the total available, which can highlight inefficiencies in data pruning34.
What does SnowCD help Snowflake users to do?
A.
Copy data into files.
B.
Manage different databases and schemas.
C.
Troubleshoot network connections to Snowflake.
D.
Write SELECT queries to retrieve data from external tables.
For which use cases is running a virtual warehouse required? (Select TWO).
A.
When creating a table
B.
When loading data into a table
C.
When unloading data from a table
D.
When executing a show command
E.
When executing a list command
Running a virtual warehouse is required when loading data into a table and when unloading data from a table because these operations require compute resources that are provided by the virtual warehouse23.
Which VALIDATION_MODE value will return the errors across the files specified in a COPY command, including files that were partially loaded during an earlier load?
A.
RETURN_-1_R0WS
B.
RETURN_n_ROWS
C.
RETURN_ERRORS
D.
RETURN ALL ERRORS
Which object can be used with Secure Data Sharing?
A.
View
B.
Materialized view
C.
External table
D.
User-Defined Function (UDF)
Who can activate and enforce a network policy for all users in a Snowflake account? (Select TWO).
A.
A user with an USERADMIN or higher role
B.
A user with a SECURITYADMIN or higher role
C.
A role that has been granted the ATTACH POLICY privilege
D.
A role that has the NETWORK_POLlCY account parameter set
E.
A role that has the ownership of the network policy
In Snowflake, a user with the SECURITYADMIN role or higher can activate and enforce a network policy for all users in an account. Additionally, a role that has ownership of the network policy can also activate and enforce it
Which statements describe benefits of Snowflake's separation of compute and storage? (Select TWO).
A.
The separation allows independent scaling of computing resources.
B.
The separation ensures consistent data encryption across all virtual data warehouses.
C.
The separation supports automatic conversion of semi-structured data into structured data for advanced data analysis.
D.
Storage volume growth and compute usage growth can be tightly coupled.
E.
Compute can be scaled up or down without the requirement to add more storage.
Snowflake’s architecture allows for the independent scaling of compute resources, meaning you can increase or decrease the computational power as needed without affecting storage. This separation also means that storage can grow independently of compute usage, allowing for more flexible and cost-effective data management.
Which type of loop requires a BREAK statement to stop executing?
A.
FOR
B.
LOOP
C.
REPEAT
D.
WHILE
Which command is used to unload data from a Snowflake database table into one or more files in a Snowflake stage?
A.
CREATE STAGE
B.
COPY INTO