MCQs on Snowflake Security and Governance | Snowflake

Snowflake’s security and governance features are designed to protect data and ensure compliance with organizational and regulatory standards. Chapter 7 focuses on critical aspects such as Role-Based Access Control (RBAC), data masking and encryption, secure data sharing, and monitoring and auditing. This set of multiple-choice questions will test your understanding of these key concepts.


Role-Based Access Control (RBAC)

  1. What is the primary purpose of Role-Based Access Control in Snowflake?
    a) Optimizing query performance
    b) Assigning permissions to specific users
    c) Managing data encryption
    d) Automating data backups
  2. In Snowflake, roles are:
    a) User-specific functions
    b) Logical objects that define permissions
    c) Physical storage units
    d) Query optimization tools
  3. Which command is used to create a new role in Snowflake?
    a) CREATE USER
    b) CREATE ROLE
    c) ADD PERMISSION
    d) GRANT PRIVILEGE
  4. The hierarchy of roles in Snowflake is managed by:
    a) Linking roles to warehouses
    b) Assigning roles to other roles
    c) Setting up database replication
    d) Granting privileges to databases
  5. To revoke a role from a user, which command is used?
    a) REMOVE ROLE FROM USER
    b) DELETE ROLE
    c) REVOKE ROLE FROM USER
    d) UNASSIGN ROLE

Data Masking and Encryption

  1. What is data masking in Snowflake?
    a) A technique to replicate data across regions
    b) Hiding sensitive data by obfuscating its values
    c) Encrypting data for secure storage
    d) Optimizing query performance
  2. Data masking in Snowflake can be applied using:
    a) Secure views
    b) Dynamic data masking policies
    c) Materialized views
    d) Data replication
  3. Which Snowflake feature ensures that data is always encrypted?
    a) Time Travel
    b) Always-On Encryption
    c) Secure Data Vault
    d) Multi-Factor Authentication
  4. What type of encryption does Snowflake use for data at rest?
    a) RSA
    b) AES-256
    c) Blowfish
    d) DES
  5. The primary goal of data masking is to:
    a) Improve database performance
    b) Simplify data replication
    c) Protect sensitive information
    d) Enhance data sharing capabilities

Secure Data Sharing

  1. Snowflake Secure Data Sharing allows:
    a) Sharing data without copying it
    b) Exporting data to external cloud providers
    c) Encrypting data for physical transfer
    d) Replicating databases across accounts
  2. Which Snowflake object is required for secure data sharing?
    a) Materialized View
    b) Secure View
    c) Share
    d) Virtual Warehouse
  3. Data shared using Snowflake Secure Data Sharing is:
    a) Stored on shared external drives
    b) Read-only for recipients
    c) Automatically replicated
    d) Fully editable by all users
  4. To create a share, you must:
    a) Use the “CREATE SHARE” command
    b) Activate a new Snowflake account
    c) Configure database replication settings
    d) Modify warehouse permissions
  5. Secure Data Sharing is ideal for:
    a) Transferring large datasets quickly
    b) Sharing live data securely between accounts
    c) Improving warehouse performance
    d) Archiving historical data

Monitoring and Auditing

  1. Which Snowflake feature helps track user activity?
    a) Role-Based Access Control
    b) Query History
    c) Audit Logs
    d) Secure Data Masking
  2. Snowflake’s “Query History” provides details about:
    a) All user logins
    b) Data encryption status
    c) Executed SQL statements
    d) Role assignments
  3. The “Access History” view in Snowflake is used to:
    a) Monitor query performance
    b) Track data access and usage
    c) Configure secure data sharing
    d) Assign roles to users
  4. For real-time monitoring of Snowflake activities, you can use:
    a) Task Scheduler
    b) External Notification Services
    c) Snowflake’s Resource Monitors
    d) Data Replication Tools
  5. Resource Monitors in Snowflake are primarily used to:
    a) Analyze user activity
    b) Control compute resource usage
    c) Enhance data encryption
    d) Create dynamic masking policies

Additional Questions for Review

  1. Which role in Snowflake typically handles audit tasks?
    a) SECURITYADMIN
    b) SYSADMIN
    c) ACCOUNTADMIN
    d) WAREHOUSEADMIN
  2. Data encryption in transit ensures:
    a) Data integrity during replication
    b) Data security during transmission
    c) Faster query execution
    d) Automated backups
  3. Dynamic data masking policies are defined based on:
    a) Query optimization rules
    b) User roles and permissions
    c) Data warehouse settings
    d) Audit logs
  4. The “GRANT USAGE” privilege in Snowflake allows:
    a) Users to modify database objects
    b) Access to specific database objects
    c) Management of user roles
    d) Enabling encryption for tables
  5. Secure Data Sharing eliminates the need for:
    a) Creating copies of data
    b) Encrypting data
    c) Managing roles and users
    d) Data warehouses
  6. Snowflake logs all account-level activities using:
    a) Activity Streams
    b) Audit Logs
    c) Resource Monitors
    d) Query Optimizers
  7. In Snowflake, user authentication can be enhanced by enabling:
    a) Always-On Encryption
    b) Multi-Factor Authentication
    c) Query Caching
    d) Virtual Warehousing
  8. Monitoring and auditing help organizations:
    a) Automate database backups
    b) Ensure compliance and detect anomalies
    c) Improve query performance
    d) Reduce storage costs
  9. Snowflake’s Time Travel feature is useful for:
    a) Query performance tracking
    b) Restoring data to a previous state
    c) Encrypting data
    d) Monitoring warehouse usage
  10. The SECURITYADMIN role is responsible for:
    a) Creating databases
    b) Managing roles, users, and permissions
    c) Setting up warehouses
    d) Optimizing SQL queries

Answers

QnoAnswer
1b) Assigning permissions to specific users
2b) Logical objects that define permissions
3b) CREATE ROLE
4b) Assigning roles to other roles
5c) REVOKE ROLE FROM USER
6b) Hiding sensitive data by obfuscating its values
7b) Dynamic data masking policies
8b) Always-On Encryption
9b) AES-256
10c) Protect sensitive information
11a) Sharing data without copying it
12c) Share
13b) Read-only for recipients
14a) Use the “CREATE SHARE” command
15b) Sharing live data securely between accounts
16c) Audit Logs
17c) Executed SQL statements
18b) Track data access and usage
19c) Snowflake’s Resource Monitors
20b) Control compute resource usage
21a) SECURITYADMIN
22b) Data security during transmission
23b) User roles and permissions
24b) Access to specific database objects
25a) Creating copies of data
26b) Audit Logs
27b) Multi-Factor Authentication
28b) Ensure compliance and detect anomalies
29b) Restoring data to a previous state
30b) Managing roles, users, and permissions

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top