New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Snowflake ARA-C01 Exam - Topic 3 Question 57 Discussion

Actual exam question for Snowflake's ARA-C01 exam
Question #: 57
Topic #: 3
[All ARA-C01 Questions]

A user, analyst_user has been granted the analyst_role, and is deploying a SnowSQL script to run as a background service to extract data from Snowflake.

What steps should be taken to allow the IP addresses to be accessed? (Select TWO).

Show Suggested Answer Hide Answer
Suggested Answer: B, D

To ensure that an analyst_user can only access Snowflake from specific IP addresses, the following steps are required:

Option B: This alters the network policy directly linked to analyst_user. Setting a network policy on the user level is effective and ensures that the specified network restrictions apply directly and exclusively to this user.

Option D: Before a network policy can be set or altered, the appropriate role with permission to manage network policies must be used. SECURITYADMIN is typically the role that has privileges to create and manage network policies in Snowflake. Creating a network policy that specifies allowed IP addresses ensures that only requests coming from those IPs can access Snowflake under this policy. After creation, this policy can be linked to specific users or roles as needed.

Options A and E mention altering roles or using the wrong role (USERADMIN typically does not manage network security settings), and option C incorrectly attempts to set a network policy directly as an IP address, which is not syntactically or functionally valid. Reference: Snowflake's security management documentation covering network policies and role-based access controls.


Contribute your Thoughts:

0/2000 characters
Krissy
1 day ago
I think option D is the way to go for creating the policy.
upvoted 0 times
...
Francis
7 days ago
Definitely need to set the network policy for the role.
upvoted 0 times
...
Irving
12 days ago
Wait, why do we need to create a network policy? Can't we just use the default one?
upvoted 0 times
...
Hyman
17 days ago
D and E for sure, gotta lock down that network policy!
upvoted 0 times
...
Refugia
22 days ago
Haha, I bet the analyst_user is trying to hack the system from their grandma's basement.
upvoted 0 times
...
Chanel
27 days ago
I think C is a good option too, it's more direct.
upvoted 0 times
...
Earleen
1 month ago
D and E are the correct options.
upvoted 0 times
...
Rosendo
1 month ago
I practiced a similar question, and I think we need to set the network policy for the user after creating it, so maybe B and D are the right choices?
upvoted 0 times
...
Beckie
1 month ago
I feel like we definitely need to create the network policy, but I'm confused about whether we should use the SECURITYADMIN or USERADMIN role for that.
upvoted 0 times
...
Virgina
2 months ago
I remember something about setting the network policy for the user, so option B might be one of the answers, but I can't recall if we need to set it for the role instead.
upvoted 0 times
...
Vallie
2 months ago
I'm feeling confident about this one. The key is to create the network policy with the allowed IP list, and then assign that policy to both the user and the role. I'll go with options D and E.
upvoted 0 times
...
Ammie
2 months ago
This is straightforward. I just need to use the ALTER USER and ALTER ROLE commands to set the network policy for the analyst_user and analyst_role. Options D and E look like the right answers here.
upvoted 0 times
...
Maile
2 months ago
Okay, I've got it. I need to use the SECURITYADMIN role to create the ANALYST_POLICY network policy, and then assign that policy to both the ANALYST_ROLE and the ANALYST_USER. That should do the trick.
upvoted 0 times
...
Jess
2 months ago
I think we need to create a network policy first, so maybe options D or E could be correct? But I'm not sure which role to use.
upvoted 0 times
...
Felicitas
3 months ago
Totally agree, A and D seem like the right choices!
upvoted 0 times
...
Rashida
3 months ago
C seems wrong, it’s not a policy.
upvoted 0 times
...
Pedro
3 months ago
Hmm, I'm a bit confused. Do I need to create a new network policy, or just assign an existing one to the user and role? I'll have to think this through step-by-step.
upvoted 0 times
...
Antonio
3 months ago
This looks like a network policy question. I'll need to carefully read through the options and think about which ones would allow the analyst_user to access the required IP addresses.
upvoted 0 times
Jenise
2 months ago
I think we need to set the network policy first.
upvoted 0 times
...
...

Save Cancel