Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

COF-C02 Snowflake SnowPro Core Certification Exam Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Snowflake COF-C02 SnowPro Core Certification Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 9
Total 1085 questions

Which Snowflake mechanism is used to limit the number of micro-partitions scanned by a query?

A.

Caching

B.

Cluster depth

C.

Query pruning

D.

Retrieval optimization

Which activities are included in the Cloud Services layer? {Select TWO).

A.

Data storage

B.

Dynamic data masking

C.

Partition scanning

D.

User authentication

E.

Infrastructure management

Which URL provides access to files in Snowflake without authorization?

A.

File URL

B.

Scoped URL

C.

Pre-signed URL

D.

Scoped file URL

The VALIDATE table function has which parameter as an input argument for a Snowflake user?

A.

Last_QUERY_ID

B.

CURRENT_STATEMENT

C.

UUID_STRING

D.

JOB_ID

What information does the Query Profile provide?

A.

Graphical representation of the data model

B.

Statistics for each component of the processing plan

C.

Detailed Information about I he database schema

D.

Real-time monitoring of the database operations

What is the Fail-safe retention period for transient and temporary tables?

A.

0 days

B.

1 day

C.

7 days

D.

90 days

Which command can be used to list all the file formats for which a user has access privileges?

A.

LIST

B.

ALTER FILE FORMAT

C.

DESCRIBE FILE FORMAT

D.

SHOW FILE FORMATS

Which function will provide the proxy information needed to protect Snowsight?

A.

SYSTEMADMIN_TAG

B.

SYSTEM$GET_PRIVATELINK

C.

SYSTEMSALLONTLIST

D.

SYSTEMAUTHORIZE

What is used to denote a pre-computed data set derived from a SELECT query specification and stored for later use?

A.

View

B.

Secure view

C.

Materialized view

D.

External table

Which privilege is required to use the search optimization service in Snowflake?

A.

GRANT SEARCH OPTIMIZATION ON SCHEMA < schema_name > TO ROLE < role >

B.

GRANT SEARCH OPTIMIZATION ON DATABASE < database_name > TO ROLE < role >

C.

GRANT ADD SEARCH OPTIMIZATION ON SCHEMA < schema_name > TO ROLE < role >

D.

GRANT ADD SEARCH OPTIMIZATION ON DATABASE < database name > TO ROLE < role >

Which Snowflake edition offers the highest level of security for organizations that have the strictest requirements?

A.

Standard

B.

Enterprise

C.

Business Critical

D.

Virtual Private Snowflake (VPS)

How does a Snowflake stored procedure compare to a User-Defined Function (UDF)?

A.

A single executable statement can call only two stored procedures. In contrast, a single SQL statement can call multiple UDFs.

B.

A single executable statement can call only one stored procedure. In contrast, a single SQL statement can call multiple UDFs.

C.

A single executable statement can call multiple stored procedures. In contrast, multiple SQL statements can call the same UDFs.

D.

Multiple executable statements can call more than one stored procedure. In contrast, a single SQL statement can call multiple UDFs.

When unloading data, which file format preserves the data values for floating-point number columns?

A.

Avro

B.

CSV

C.

JSON

D.

Parquet

What criteria does Snowflake use to determine the current role when initiating a session? (Select TWO).

A.

If a role was specified as part of the connection and that role has been granted to the Snowflake user, the specified role becomes the current role.

B.

If no role was specified as part of the connection and a default role has been defined for the Snowflake user, that role becomes the current role.

C.

If no role was specified as part of the connection and a default role has not been set for the Snowflake user, the session will not be initiated and the log in will fail.

D.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, it will be ignored and the default role will become the current role.

E.

If a role was specified as part of the connection and that role has not been granted to the Snowflake user, the role is automatically granted and it becomes the current role.

What is the Fail-safe period for a transient table in the Snowflake Enterprise edition and higher?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

What are characteristics of transient tables in Snowflake? (Select TWO).

A.

Transient tables have a Fail-safe period of 7 days.

B.

Transient tables can be cloned to permanent tables.

C.

Transient tables persist until they are explicitly dropped.

D.

Transient tables can be altered to make them permanent tables.

E.

Transient tables have Time Travel retention periods of 0 or 1 day.

A user wants to add additional privileges to the system-defined roles for their virtual warehouse. How does Snowflake recommend they accomplish this?

A.

Grant the additional privileges to a custom role.

B.

Grant the additional privileges to the ACCOUNTADMIN role.

C.

Grant the additional privileges to the SYSADMIN role.

D.

Grant the additional privileges to the ORGADMIN role.

By default, how long is the standard retention period for Time Travel across all Snowflake accounts?

A.

0 days

B.

1 day

C.

7 days

D.

14 days

Which Snowflow object does not consume and storage costs?

A.

Secure view

B.

Materialized view

C.

Temporary table

D.

Transient table

How does Snowflake describe its unique architecture?

A.

A single-cluster shared data architecture using a central data repository and massively parallel processing (MPP)

B.

A multi-duster shared nothing architecture using a soloed data repository and massively parallel processing (MPP)

C.

A single-cluster shared nothing architecture using a sliced data repository and symmetric multiprocessing (SMP)

D.

A multi-cluster shared nothing architecture using a siloed data repository and symmetric multiprocessing (SMP)

Which service or feature in Snowflake is used to improve the performance of certain types of lookup and analytical queries that use an extensive set of WHERE conditions?

A.

Data classification

B.

Query acceleration service

C.

Search optimization service

D.

Tagging

A Snowflake user wants to temporarily bypass a network policy by configuring the user object property MINS_TO_BYPASS_NETWORK_POLICY.

What should they do?

A.

Use the SECURITYADMIN role.

B.

Use the SYSADMIN role.

C.

Use the USERADMIN role.

D.

Contact Snowflake Support.

What information is found within the Statistic output in the Query Profile Overview?

A.

Operator tree

B.

Table pruning

C.

Most expensive nodes

D.

Nodes by execution time

Which Snowflake data types can be used to build nested hierarchical data? (Select TWO)

A.

INTEGER

B.

OBJECT

C.

VARIANT

D.

VARCHAR

E.

LIST

What objects in Snowflake are supported by Dynamic Data Masking? (Select TWO). '

A.

Views

B.

Materialized views

C.

Tables

D.

External tables

E.

Future grants

Which Snowflake command can be used to unload the result of a query to a single file?

A.

Use COPY INTO < external stage > followed by a GET command to download the file.

B.

Use COPY INTO < internal stage > followed by a put command to download the file.

C.

Use COPY INTO < internal stage > with SINGLE = TRUE followed by a GET command to download the file.

D.

Use COPY INTO < external stage > with SINGLE = TRUE followed by a PUT command to download the file.

Which Snowflake feature allows administrators to identify unused data that may be archived or deleted?

A.

Access history

B.

Data classification

C.

Dynamic Data Masking

D.

Object tagging

A Snowflake account has activated federated authentication.

What will occur when a user with a password that was defined by Snowflake attempts to log in to Snowflake?

A.

The user will be unable to enter a password.

B.

The user will encounter an error, and will not be able to log in.

C.

The user will be able to log into Snowflake successfully.

D.

After entering the username and password, the user will be redirected to an Identity Provider (IdP) login page.

A user wants to access files stored in a stage without authenticating into Snowflake. Which type of URL should be used?

A.

File URL

B.

Staged URL

C.

Scoped URL

D.

Pre-signed URL

While working with unstructured data, which file function generates a Snowflake-hosted file URL to a staged file using the stage name and relative file path as inputs?

A.

GET_PRESIGNED_URL

B.

GET_ABSOLUTE_PATH

C.

BUILD_STAGE_FILE_URL

D.

BUILD SCOPED FILE URL

What is the purpose of the STRIP NULL_VALUES file format option when loading semi-structured data files into Snowflake?

A.

It removes null values from all columns in the data.

B.

It converts null values to empty strings during loading.

C.

It skips rows with null values during the loading process.

D.

It removes object or array elements containing null values.

What Snowflake feature provides a data hub for secure data collaboration, with a selected group of invited members?

A.

Data Replication

B.

Secure Data Sharing

C.

Data Exchange

D.

Snowflake Marketplace

What transformations are supported when loading data into a table using the COPY INTO < table > command? (Select TWO).

A.

Column reordering

B.

Column omission

C.

JOIN function

D.

FLATTEN function

E.

GROUP BY function

Which command is used to unload data from a Snowflake database table into one or more files in a Snowflake stage?

A.

CREATE STAGE

B.

COPY INTO < table >

C.

COPY INTO < location >

D.

CREATE PIPE

What are the least privileges needed to view and modify resource monitors? (Select TWO).

A.

SELECT

B.

OWNERSHIP

C.

MONITOR

D.

MODIFY

E.

USAGE

A tag object has been assigned to a table (TABLE_A) in a schema within a Snowflake database.

Which CREATE object statement will automatically assign the TABLE_A tag to a target object?

A.

CREATE TABLE < table_name > LIKE TABLE_A;

B.

CREATE VIEW < view_name > AS SELECT * FROM TABLE_A;

C.

CREATE TABLE < table_name > AS SELECT * FROM TABLE_A;

D.

CREATE MATERIALIZED VIEW < view name > AS SELECT * FROM TABLE A;

Which commands can only be executed using SnowSQL? (Select TWO).

A.

COPY INTO

B.

GET

C.

LIST

D.

PUT

E.

REMOVE

Which Snowflake function will parse a JSON-null into a SQL-null?

A.

TO_CHAR

B.

TO_VARIANT

C.

TO_VARCHAR

D.

STRIP NULL VALUE

Which Snowflake table objects can be shared with other accounts? (Select TWO).

A.

Temporary tables

B.

Permanent tables

C.

Transient tables

D.

External tables

E.

User-Defined Table Functions (UDTFs)

What will prevent unauthorized access to a Snowflake account from an unknown source?

A.

Network policy

B.

End-to-end encryption

C.

Multi-Factor Authentication (MFA)

D.

Role-Based Access Control (RBAC)

Page: 6 / 9
Total 1085 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved