0
0
Snowflakecloud~10 mins

Why governance ensures data trust at scale in Snowflake - Test Your Understanding

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to create a role with read-only access.

Snowflake
CREATE ROLE [1];
Drag options to blanks, or click blank then click option'
Awrite_access
Bdata_reader
Cadmin_role
Ddata_writer
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing a role name that implies write access instead of read-only.
2fill in blank
medium

Complete the code to grant SELECT permission on a table to a role.

Snowflake
GRANT [1] ON TABLE sales_data TO ROLE data_reader;
Drag options to blanks, or click blank then click option'
ASELECT
BINSERT
CUPDATE
DDELETE
Attempts:
3 left
💡 Hint
Common Mistakes
Granting write permissions like INSERT or UPDATE instead of SELECT.
3fill in blank
hard

Fix the error in the code to revoke a role's access properly.

Snowflake
REVOKE [1] ON DATABASE analytics FROM ROLE data_analyst;
Drag options to blanks, or click blank then click option'
ACREATE
BSELECT
CUSAGE
DDROP
Attempts:
3 left
💡 Hint
Common Mistakes
Revoking permissions that do not control access to the database directly.
4fill in blank
hard

Fill both blanks to create a secure masking policy and apply it to a column.

Snowflake
CREATE MASKING POLICY [1] AS (val STRING) RETURNS STRING -> CASE WHEN CURRENT_ROLE() [2] 'data_reader' THEN val ELSE '****' END;
Drag options to blanks, or click blank then click option'
Amask_ssn
BLIKE
C=
Dmask_email
Attempts:
3 left
💡 Hint
Common Mistakes
Using LIKE instead of = for exact role matching.
Choosing a policy name unrelated to the data.
5fill in blank
hard

Fill all three blanks to grant a masking policy to a column in a table.

Snowflake
ALTER TABLE customer_data ALTER COLUMN [1] SET MASKING POLICY [2]; GRANT [3] ON TABLE customer_data TO ROLE data_reader;
Drag options to blanks, or click blank then click option'
Assn
Bmask_ssn
CSELECT
Demail
Attempts:
3 left
💡 Hint
Common Mistakes
Applying masking to the wrong column.
Granting incorrect permissions like INSERT or UPDATE.