Account Access and Security

Implement role-based access control, authentication, encryption, and compliance features in Snowflake (18% of exam).

This domain covers implementing role-based access control (RBAC), configuring authentication methods including MFA and SSO, managing network policies, understanding data encryption at rest and in transit, monitoring and auditing user activities, and ensuring compliance with security standards. These skills are essential for securing Snowflake deployments.
5 minutes 5 Questions

Account Access and Security in Snowflake encompasses the comprehensive framework for managing user authentication, authorization, and protecting sensitive data within the platform. This is a critical domain for the SnowPro Core Certification exam. **Authentication Methods:** Snowflake supports mul…

Concepts covered: Role-based access control (RBAC), System-defined roles (ACCOUNTADMIN, SYSADMIN, SECURITYADMIN, etc.), Custom roles and role hierarchy, Privileges and privilege management, Object ownership and access, User authentication methods, Multi-factor authentication (MFA), Single sign-on (SSO) with SAML, Key pair authentication, OAuth integration, Network policies, Private connectivity (AWS PrivateLink, Azure Private Link), Data encryption at rest and in transit, Tri-Secret Secure encryption, Account usage views and monitoring, Access history and auditing, Session policies

Test mode:
COF-C02 - Account Access and Security Example Questions

Test your knowledge of Account Access and Security

Question 1

A cybersecurity firm has deployed Snowflake for their threat intelligence platform. Their security architect is designing the authentication strategy and notices that the organization has two distinct user populations: internal security analysts who use workstations joined to the corporate domain with Ping Identity SSO, and automated threat detection scripts that run on isolated network segments. The scripts need to authenticate every 15 minutes to pull fresh data, and storing any form of password in the script environment is prohibited by policy. The architect must recommend appropriate authentication methods for both user populations. Which combination of authentication methods best addresses both use cases?

Question 2

What type of key does Snowflake use to encrypt the master key in its hierarchical key model for data at rest protection?

Question 3

Scenario: Kevin, a platform engineer at a SaaS company, is troubleshooting intermittent performance issues reported by customers using their Snowflake-powered analytics platform. The issues seem to occur during specific hours when multiple tenants run heavy workloads simultaneously. Kevin wants to analyze query execution patterns and identify which queries are competing for resources. He decides to use the QUERY_HISTORY view in ACCOUNT_USAGE to correlate slow query times with warehouse queue events. While building his analysis, Kevin joins QUERY_HISTORY with WAREHOUSE_EVENTS_HISTORY to understand queuing behavior. He notices that for some recent queries executed 30 minutes ago, the QUERY_HISTORY view returns results, but there are no corresponding records in WAREHOUSE_EVENTS_HISTORY for the same time period. What is the most likely reason for this data discrepancy between these two ACCOUNT_USAGE views?

More Account Access and Security questions
507 questions (total)