Snowflake SnowPro Advanced - Administrator Certification Exam Syllabus

ADA-C02 Dumps Questions, ADA-C02 PDF, SnowPro Advanced - Administrator Exam Questions PDF, Snowflake ADA-C02 Dumps Free, SnowPro Advanced - Administrator Official Cert Guide PDFThe Snowflake ADA-C02 exam preparation guide is designed to provide candidates with necessary information about the SnowPro Advanced - Administrator exam. It includes exam summary, sample questions, practice test, objectives and ways to interpret the exam objectives to enable candidates to assess the types of questions-answers that may be asked during the Snowflake Certified SnowPro Advanced - Administrator exam.

It is recommended for all the candidates to refer the ADA-C02 objectives and sample questions provided in this preparation guide. The Snowflake SnowPro Advanced - Administrator certification is mainly targeted to the candidates who want to build their career in Advance domain and demonstrate their expertise. We suggest you to use practice exam listed in this cert guide to get used to with exam environment and identify the knowledge areas where you need more work prior to taking the actual Snowflake SnowPro Advanced - Administrator exam.

Snowflake ADA-C02 Exam Summary:

Exam Name Snowflake SnowPro Advanced - Administrator
Exam Code ADA-C02
Exam Price $375 USD
Duration 115 minutes
Number of Questions 65
Passing Score 750 + Scaled Scoring from 0 - 1000
Recommended Training / Books Administering Snowflake Training
Schedule Exam PEARSON VUE
Sample Questions Snowflake ADA-C02 Sample Questions
Recommended Practice Snowflake Certified SnowPro Advanced - Administrator Practice Test

Snowflake SnowPro Advanced - Administrator Syllabus:

Section Objectives

Snowflake Security, Role-Based Access Control (RBAC), and User Administration - 31%

Manage administrative roles - Identify use cases and follow best practices for ORGADMIN and ACCOUNTADMIN roles (note: ORGADMIN will be replaced with GLOBARORGADMIN)
- Analyze the impact of organizational-level changes on account-level objects
Given a set of business requirements, design access control framework - Identify use cases for the different frameworks
  • Discretionary Access Control (DAC)
  • Role-Based Access Control (RBAC)
  • User-based access Control (UBAC)

- Determine the use cases for, and hierarchy of, system-defined roles
- Determine the use cases for custom security roles
- Analyze the implications of role inheritance when granting or revoking privileges
- Grant access to specific objects within a database that require privilege inheritance

Given a scenario, create and manage access control. - Identify and apply different privileges available for each object type
- Custom security roles and users (SHOW command)
- Analyze and audit user and query activity history using the ACCOUNT_USAGE and ORGANIZATION_USAGE schemas
Given a scenario, fine-tune access controls. - Secure the ACCOUNTADMIN role
- Use and manage database roles and use cases
- Create custom roles
- Determine use cases for primary and secondary roles
- Align usage of object access with business functions
- Manage cloned objects and their impact on granted privileges
- Create additional Administrators
- Monitor granted privileges to users and roles, and on objects
- Implement and manage future grants including restrictions
- Manage warehouse grants (for example, USAGE, OPERATE, MODIFY, MONITOR)
- Implement and manage managed access schemas
- Provide access to non-account Administrators to monitor billing and usage information
- Manage account-level permissions
- Enable security and access control for AI/ML models
Set up and manage Snowflake authentication. - Establish federated authentication and Single Sign-on (SSO) to Snowflake
  • Configure an Identity Provider (IdP) for Snowflake
  • Configure, use, and manage federated authentication with Snowflake

- Implement and manage passwords and multi-factor authentication (MFA)

  • Manage user types (PERSON, NULL and SERVICE)
  • Manage passwords and password policies
  • Manage user MFA enrollment
  • Manage key-pair authentication and rotation
  • Manage programmatic authentication tokens and rotation
  • Report on users who do not have MFA enabled
  • Reset passwords and temporarily disable MFA for users

- Configure and use OAuth protocols

  • Use OAuth 2.0 in Snowflake
  • Compare Snowflake OAuth to External OAuth
  • Configure Snowflake OAuth for custom clients
  • Analyze how Snowflake OAuth is impacted by federated authentication, network policies, and private connectivity
Set up and manage network and private connectivity. - Establish network rules
  • Configure and manage network rules
  • Analyze network policy behavior when both account-level and user-level network rules exist

- Establish private connectivity to Snowflake internal stages and the Snowflake service

  • Implement and manage cloud provider interfaces and private endpoints for internal stages
  • Manage private connectivity between cloud providers and Snowflake

- Secure and Integrate the Snowflake SQL API

Set up and manage security administration and authorization. - Use and monitor SCIM
  • Analyze SCIM and its use cases as they relate to Snowflake
  • Manage users and groups with SCIM
  • Enable, configure, and manage SCIM integration

- Prevent data exfiltration with PREVENT_UNLOAD_TO_INLINE_URL and REQUIRE_STORAGE_INTEGRATION _FOR_STAGE_CREATION
- Manage service accounts, API integration, and automated authentication (for example, key-pair authentication)
- Manage access to AI features and models

Account Management and Data Governance - 18%

Manage organizations and accounts. - Evaluate the benefits and costs of using a Snowflake Organization
- Perform organizational tasks
  • Create and name an organization
  • Name various types of organization accounts
  • Identify which regions are available for a given organization

- Perform account tasks

  • View, create, and list accounts
  • Change account names

- Manage Tri-Secret Secure
- Manage encryption keys in Snowflake

  • Describe how Snowflake encrypts customer data
  • Describe encryption key rotation and periodic rekeying configuration

- Manage account-level parameters and features

  • Enable Cortex AI features for users
Implement and manage data governance in Snowflake. - Protect sensitive data with security policies
  • Implement column-level security using data masking policies
  • Use external tokenization
  • Evaluate the use of data masking versus external tokenization based on business requirements
  • Configure a row access policy on an object
  • Compare row access policies to secure views
  • Identify the impact of attaching a row access policy to an object

- Audit access history using the ACCESS_HISTORY views
- Use tagging and classification in Snowflake

  • Identify tagging use cases
  • Implement and manage tagging
  • Implement tag-based masking policies
  • Implement data classification (EXTRACT_SEMANTIC_CATEGORIES, ASSOCIATE_SEMANTIC_CATEGORIES)

- Manage data governance through Snowsight

  • Configuring and monitor tags
  • Implement and manage Trust Center

- Manage Horizon Catalog, Universal Search, and Data Lineage

Given a scenario, manage account identifiers. - Differentiate between account names and account locators
- Identify when a given account identifier needs to be used
- Use region IDs and region groups

Data and Object Management - 15%

Given business requirements, design, manage, and maintain virtual warehouses. - Analyze the impact on data loading and query processing based on warehouse sizes and types
- Configure warehouse properties (auto-suspend, auto-resume, max clusters)
- Given a scenario, manage warehouse usage in sessions, and size the warehouse accordingly
- Given a scenario, manage a multi-cluster warehouse
  • Determine use cases and benefits
  • Implement and maintain a scaling policy
  • Monitor multi-cluster warehouses
Given a scenario, manage databases, tables, and views. - Manage tables
  • Analyze table design considerations
  • Implement Snowflake table structures and types
  • Create and manage external tables
  • Create and manage iceberg tables

- Implement and manage views, secure views, and materialized views
- Identify use cases for cloning databases and tables

Given a scenario, stage data in Snowflake. - Create and manage Snowflake storage integration
  • External stages
  • Data exfiltration

- Create and manage EXTERNAL_VOLUME with Iceberg tables
- Create and configure the Polaris Catalog

Given a scenario, manage tasks. - Configure tasks
  • Manage and schedule tasks
  • Set permissions for creating and executing tasks
  • Troubleshoot task historical runs
  • Identify use cases

- Differentiate between user-managed and Snowflake-managed tasks and identify use cases.

Perform queries in Snowflake. - Use Snowflake sequences and identify limitations
- Use persisted query results
- Cancel statements for single users or multiple users
- Use query history filters including client-generated queries and queries executed by user tasks
- Visualize query results with Snowsight
  • Use Snowsight dashboards to monitor activity
  • Share worksheets and dashboards
  • Generate and share Snowsight charts
  • Identify constraints with sharing a Snowsight chart
  • Recover dropped dashboards

Performance Monitoring and Tuning - 20%

Monitor and analyze Snowflake performance. - Evaluate and interpret Query Profiles to improve performance
  • Analyze the components of the Query Profile:
    - Steps
    - Operator tree
    - Operator nodes
    - Operator types
  • Compare compile versus runtime optimizations
  • Identify and create efficient queries
    - Articulate the execution path
    - Use effective joining conditions
    - Perform grouping, sorting, and ordering
  • Troubleshoot common query performance issues
  • Identify impact and solutions for data spilling
  • Identify impact and solutions if data pruning is not happening
  • Identify the various timeout parameters

- Use an explain plan
- Compare and contrast different caching techniques and the impact of caching on performance

  • Result cache
  • Local disk (warehouse) cache
    - Explain the impact on the local disc cache when a warehouse is suspended or resumed
  • Metadata cache
  • Implement performance improvements
    - Recommend the use of materialized views
    - Use the search optimization service
    - Create external tables
    - Use data caching
    - Use the query acceleration service
Manage DML locking and concurrency in Snowflake. - Analyze DML concurrency considerations
- Implement best practices for DML locking and concurrency
- Monitor and manage transaction activity
Given a scenario, implement resource monitors. - Create and manage resource monitors based on use cases and business requirements
- Set up a dashboard to monitor Snowflake costs
Enable and manage logging and tracing. - Manage event tables
  • Consider the use of default system event tables compared to custom tables
  • Configure event tables
  • Set levels for logs, metrics and tracing

- Analyze event tables for system health indicators
- Use log data to monitor user activity, threat detection, and access control

  • Create alerts

- Use log trace data to perform root cause analyses
- Use log trace data to optimize performance

Manage and optimize costs. - Manage organization costs
  • Differentiate use cases for the ACCOUNT_USAGE and ORGANIZATION_USAGE views
  • Monitor accounts and usage
    - Use the ORGANIZATION_US AGE schema in the SNOWFLAKE shared database
  • Monitor and calculate data transfer costs and replication costs
  • Calculate data storage usage and credit consumption
  • Apply techniques for cost optimization

- Evaluate use cases for the ACCOUNT_USAGE and INFORMATION_SCHEMA

  • Views available from the INFORMATION_SCHEMA
  • Latency and data retention considerations
  • Latency for historical views

- Manage costs for virtual warehouses

  • Determine when warehouses should be suspended or resumed based on cost and pricing
  • Calculate warehouse usage and credit consumption
    - Demonstrate cost saving strategies
    - Calculate and minimize IDLE time cost
  • Use Budgets
  • Use WAREHOUSE_MONITORING to optimize costs
  • Monitor and assess automatic clustering usage

- Manage costs for serverless and AI features

  • Analyze how Snowflake credits are consumed by the cloud services layer (such as Snowpipe, materialized views, and automatic clustering)
  • Monitor AI and ML function costs
  • Monitor Notebooks consumption
  • Monitor AI usage and costs

Data Sharing and Snowflake Marketplace - 7%

Implement and manage data sharing. - Given a scenario, implement sharing solutions
  • Evaluate different sharing models (one to one, one to many, private, public)
  • Share data among different Snowflake editions
  • Configure cross-region and cross-cloud data sharing
    - Explain the role of replications
    - Use Cross-cloud auto fulfillment for listings
    - Use Cross-cloud Data Governance
  • Configure data sharing programmatically
    - Share different types of data objects including secure functions
    - Determine the role of context functions in data sharing

- Manage data providers and consumers

  • Create and maintain outbound data share
  • Share objects securely in a data share (for example, what type to use)
  • Identify use cases for views and secure views
  • Share data with secure User-defined Functions (UDFs)
  • Create and maintain reader accounts
    - Create user and role for access
    - Create resource monitors
    - Create objects
    - Determine if there is a need to store data (CREATE DATABASE)
  • Import and maintain inbound data shares

- Configure and manage Snowflake Data Clean Rooms

  • Install the clean room native app
  • Bring users into the clean room
  • Manage collaborators
Implement and manage the Snowflake Marketplace. - Access the public and internal Marketplace
- Determine use cases for internal versus public data listings
- Manage the process of becoming a data provider
  • Create, edit, or delete provider profiles

- Create, submit, manage, and modify a data listing
- Manage listings and listing requests
- Monitor data sharing usage
- Manage Native Apps

Disaster Recovery, Backup, and Data Replication - 9%

Manage data replication. - Differentiate the use cases for primary and secondary databases
- Replicate database objects
- Replicate account-level objects
- Analyze the impact of replication on access controls
- Perform account replication
- Enable scheduled replication
- Differentiate between replication Groups and failover groups
- Given a scenario, determine account replication considerations with respect to the different Snowflake editions
  • Replicate data to a lower Snowflake edition

- Identify key-considerations for account replications
- Analyze the impact of account replication on:

  • Automatic clustering
  • Materialized views
  • External tables
  • Policies (masking and row access) and tags
  • Streams and tasks
  • Stages, pipes, and clones objects
  • Historical usage data
  • Iceberg tables

- Analyze the impact of database failover across multiple accounts
- Analyze the impact of database failover and failback on schemas
- Redirect client connections in case of a failover
- Design and implement disaster recovery and business continuity plans

  • Identify the appropriate failover or failback procedure

- Implement best practices for backups in Snowflake

Given a scenario, manage Snowflake Time Travel and Fail-safe. - Establish data retention periods
- Query historical data
- Restore dropped objects
- Enable or disable Time Travel
  • Analyze Snowflake edition implications for Time Travel
Rating: 5 / 5 (75 votes)