0
0
Snowflakecloud~20 mins

Secure data sharing basics in Snowflake - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Secure Data Sharing Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Snowflake Secure Data Sharing

Which statement best describes how Snowflake secure data sharing works?

AData is copied and moved to the consumer's account for access.
BData is encrypted and stored in a shared external cloud bucket accessible by both parties.
CData remains in the provider's account and is accessed directly by the consumer.
DData is exported as files and sent to the consumer via email.
Attempts:
2 left
💡 Hint

Think about whether data physically moves or stays put during sharing.

Architecture
intermediate
2:00remaining
Components Required for Snowflake Data Sharing

Which combination of Snowflake objects must a provider create to share data securely with a consumer?

AA share and a database containing the objects to share.
BA share, a database, and a secure view.
CA database, a share, and a virtual warehouse.
DA secure view and a virtual warehouse.
Attempts:
2 left
💡 Hint

Consider what objects define the shared data and the sharing mechanism.

security
advanced
2:00remaining
Access Control in Snowflake Secure Data Sharing

What is the effect of granting SELECT privileges on a table to a share in Snowflake?

AConsumers can only read the table data but cannot modify it.
BConsumers can modify the table data in the provider's account.
CConsumers can create new tables in the provider's database.
DConsumers can delete the table from the provider's database.
Attempts:
2 left
💡 Hint

Think about what SELECT privilege allows.

service_behavior
advanced
2:00remaining
Behavior of Consumer Access to Shared Data

When a consumer queries data shared via Snowflake secure sharing, where is the query executed?

AIn the provider's virtual warehouse accessing the original data.
BIn the consumer's virtual warehouse accessing the provider's data remotely.
CIn the consumer's virtual warehouse accessing a local copy of the data.
DIn a shared virtual warehouse managed by Snowflake.
Attempts:
2 left
💡 Hint

Consider where compute resources run and where data physically resides.

Best Practice
expert
3:00remaining
Best Practice for Managing Sensitive Data in Snowflake Sharing

Which approach best protects sensitive columns when sharing data securely in Snowflake?

AShare the entire table and rely on consumers to ignore sensitive columns.
BGrant full access to the table and audit consumer queries regularly.
CExport the table to CSV, remove sensitive columns, then share the file externally.
DCreate a secure view that excludes or masks sensitive columns and share the view instead.
Attempts:
2 left
💡 Hint

Think about controlling data visibility at the object level within Snowflake.