New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Snowflake ADA-C01 Exam - Topic 8 Question 5 Discussion

Actual exam question for Snowflake's ADA-C01 exam
Question #: 5
Topic #: 8
[All ADA-C01 Questions]

What is required for stages, without credentials, to limit data exfiltration after a storage integration and associated stages are created?

Show Suggested Answer Hide Answer
Suggested Answer: D

According to the Snowflake documentation1, stages without credentials are a way to create external stages that use storage integrations to access data files in cloud storage without providing any credentials to Snowflake. Storage integrations are objects that define a trust relationship between Snowflake and a cloud provider, allowing Snowflake to authenticate and authorize access to the cloud storage. To limit data exfiltration after a storage integration and associated stages are created, the following account-level parameters can be set:

* REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_CREATION: This parameter enforces that all external stages must be created using a storage integration. This prevents users from creating external stages with inline credentials or URLs that point to unauthorized locations.

* REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_OPERATION: This parameter enforces that all operations on external stages, such as PUT, GET, COPY, and LIST, must use a storage integration. This prevents users from performing operations on external stages with inline credentials or URLs that point to unauthorized locations.

* PREVENT_UNLOAD_TO_INLINE_URL: This parameter prevents users from unloading data from Snowflake tables to inline URLs that do not use a storage integration. This prevents users from exporting data to unauthorized locations.

Therefore, the correct answer is option D, which sets all these parameters to true. Option A is incorrect because it sets PREVENT_UNLOAD_TO_INLINE_URL to false, which allows users to unload data to inline URLs that do not use a storage integration. Option B is incorrect because it sets both REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_CREATION and REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_OPERATION to false, which allows users to create and operate on external stages without using a storage integration. Option C is incorrect because it sets all the parameters to false, which does not enforce any restrictions on data exfiltration.


Contribute your Thoughts:

0/2000 characters
Eladia
3 months ago
I’m not sure about C, feels like a risky choice.
upvoted 0 times
...
Margart
3 months ago
Nah, B seems too relaxed for data safety.
upvoted 0 times
...
Gregoria
4 months ago
Wait, can you really prevent unload to inline URL?
upvoted 0 times
...
Erick
4 months ago
I think D is better, more restrictions.
upvoted 0 times
...
Malissa
4 months ago
Option A is the way to go for security!
upvoted 0 times
...
Aja
4 months ago
I believe we definitely want to prevent unloading to inline URLs, but I can't recall if that means we should set it to true or false in this context.
upvoted 0 times
...
Vince
4 months ago
I’m a bit confused about whether we need to set both creation and operation to true or just one of them. I wish I had reviewed that section more.
upvoted 0 times
...
Shantell
4 months ago
I remember a practice question where we had to prevent unloads to inline URLs, so I feel like option B might be the right choice.
upvoted 0 times
...
Josephine
5 months ago
I think we need to set the storage integration requirements to true to limit data exfiltration, but I'm not sure about the unload settings.
upvoted 0 times
...
Pearly
5 months ago
This looks straightforward to me. I'm pretty confident I can identify the correct answer based on the SQL statements provided in the options.
upvoted 0 times
...
Gertude
5 months ago
Okay, I think I've got a strategy for this. I'll focus on the key phrases like "stages without credentials" and "limit data exfiltration" to determine the right approach.
upvoted 0 times
...
Penney
5 months ago
Hmm, I'm a bit confused by the wording here. I'll need to re-read the question and options a few times to make sure I understand what's being asked.
upvoted 0 times
...
Monroe
5 months ago
This question seems a bit tricky, but I think I can figure it out. Let me carefully read through the options and think about the requirements.
upvoted 0 times
...
Raina
5 months ago
Okay, I've got this. The best practice is to listen to the customer and understand the incident, not just give them details about the SLA. That's not going to help them solve the problem.
upvoted 0 times
...
Isaiah
5 months ago
I'm not entirely sure about this one. The question mentions "critical devices" and "not using profiling," so I'm not sure if the MAC address or IP address is the better approach. I'll have to think this through a bit more.
upvoted 0 times
...
Ardella
5 months ago
Okay, I've got this. The key is remembering that "Full Control" gives users the ability to do everything with the files, including viewing, changing, and deleting them. I'm confident that's the right answer.
upvoted 0 times
...

Save Cancel