Free Practice Questions for Snowflake Certification
Study with 346 exam-style practice questions designed to help you prepare for the Snowflake SnowPro Advanced: Security Engineer. All questions are aligned with the latest exam guide and include detailed explanations to help you master the material.
Start Practicing
All Domains
Practice with randomly mixed questions from all topics
Domain Mode
Practice questions from a specific topic area
Quiz History
Exam Details
Key information about Snowflake SnowPro Advanced: Security Engineer
- Multiple choice
Through Snowflake Continuing Education (CE) program
Active SnowPro Core credential
Security Administrators, Security Engineers, Snowflake Security Engineers, Security Architects with 2+ years of hands-on data governance and security experience on Snowflake
10 β 13 hours
2 years
Exam Topics & Skills Assessed
Skills measured (from the official study guide)
Domain 1: Account and Security
Subdomain 1.1: Design and implement access control strategies.
β Configure and implement Role-Based Access Control (RBAC): β Automate RBAC management programmatically β Integrate RBAC management with IdPs using SCIM (user group membership) β Manage hierarchical RBAC models β Define and manage custom roles and least-privilege role hierarchies: β Understand best practices for role design (functional vs. access roles): β System-defined roles β SNOWFLAKE database roles β SNOWFLAKE application roles β User-defined custom roles (account, database, and application) β Manage privilege grants in Snowflake
Subdomain 1.2: Configure and monitor user authentication and session management.
β Implement authenticators, passkeys, and IdP-driven access β Define, configure, and enforce Multi-Factor Authentication (MFA): β Snowflake-managed MFA β Externally-managed MFA β Implement Single-Sign-On (SSO): β Configure SAML, and OAuth authentication β Troubleshoot SSO integration issues β Manage secure programmatic access: β Implement key-pair authentication β Implement Programmatic Access Token (PAT) authentication β Implement external API authentication and secrets β Rotate user credentials β Configure and monitor session policies β Design and manage leaked password and malicious IP protections
Subdomain 1.3: Implement network security controls.
β Create, implement, and manage network and rules policies: β Use network rules for granular access control β Rules policies: IP allow lists and deny lists β Apply network policies to accounts and users β Configure and troubleshoot private connectivity and storage integrations: β AWS PrivateLink, Azure Private Link, and GCP Private Service Connect β Troubleshoot private connectivity issues β Support multi-cloud network policy enforcement
Subdomain 1.4: Manage external access integrations.
β Create, implement and manage external access integrations: β Use network rules to manage allowed external endpoints β Leverage API authentication integrations β Establish the order of operations: β Perform third-party vendor risk assessment β Leverage Snowflake secrets for secure authentication with external endpoints: β OAuth β Cloud provider tokens β Passwords β Generic strings β Understand best practice recommendations for secure connectivity from Snowflake to external systems: β Egress proxy configurations β Configure external functions
Domain 2: Data Protection, Data Privacy, and Data Governance
Subdomain 2.1: Implement data security features.
β Implement, configure, and manage the customer-managed key component of Tri-Secret Secure β Implement column-level security β Design and apply Dynamic Data Masking policies β Create masking policies with SQL expressions and Snowflake functions β Manage the masking policy lifecycle: β Monitor the impact of policy changes on data visibility β Use the External Tokenization function β Use tag-based masking policies β Use projection policies β Implement row-access policies: β Design and apply row-access policies with SQL expressions and Snowflake functions β Understand policy precedence and interactions β Manage the row access policy lifecycle: β Troubleshoot row access policy enforcement β Utilize aggregation policies, differential privacy policies, and budgets
Subdomain 2.2: Manage and audit Secure Data Sharing and collaborations.
β Apply advanced privacy controls for shared data: β Use synthetic data to support privacy β Configure and manage Snowflake Data Clean Rooms: β Apply the principles of secure multi-party computation β Support collaborative analysis without direct data exposure β Understand the security implications of using secure objects, including views, functions, and procedures β Configure Data Listings
Subdomain 2.3: Restrict data exfiltration.
β Leverage account-level parameters to restrict the destinations where Snowflake can write data programmatically β Leverage account-level and user-level parameters to restrict when users can download query result sets
Subdomain 2.4: Establish and manage data retention and data lifecycle management.
β Implement Time Travel and Fail-safe for data recovery: β Manage Time Travel settings at the table, schema, and account levels β Understand the differences and use cases for Time Travel and Fail-safe β Differentiate between Time Travel and Fail-safe in context of security and compliance β Configure and enforce data retention policies β Define appropriate retention strategies for structured and semi-structured data: β Align retention policies with compliance requirements (for example, GDPR and HIPAA) β Apply retention settings using DDL and governance tools (for example, tagging and policies) β Manage the data lifecycle using object lifecycle management features: β Automate data archival and purging using lifecycle management best practices β Use table metadata and access patterns to determine data aging strategies β Leverage features including transient tables, temporary tables, and auto-drop configurations
Subdomain 2.5: Configure object tagging and data classification frameworks.
β Use automatic tag propagation, including tag inheritance: o Audit tagging using the TAG_REFERENCES and TAG_REFERENCES_HISTORY views o Visualize data lineage β Implement data classification: o Configure automatic, custom, and manual classifications o Integrate data classification into data governance policies
Subdomain 2.6: Configure and maintain data replication policies and procedures.
β Manage data replication access control and privileges: o Implement the principle of least privilege for replication-specific roles o Manage and audit privileges such as CREATE REPLICATION GROUP and REPLICATE β Define and secure ownership of replication and failover group objects β Manage replication protocols and policies o Configure replication groups to include critical security objects o Replicate network policies to maintain consistent access controls β Manage the replication of security integrations (SAML2, OAuth, SCIM) to ensure seamless authentication and authorization post-failover β Validate the replication of users, roles, and grants
Subdomain 2.7: Manage secure replication and failover operations.
β Audit pre-failover readiness: o Conduct periodic audits of replication configurations o Perform controlled tests of the failover process to validate security object promotion and functionality β Configure Client Redirect β Execute replication and failover operations: o Monitor audit logs for anomalies during the transition process o Re-establish security configurations for external resources, for example trust relationships for external stages β Perform a post-failover validation audit: o Verify that replicated network policies and security integrations are active and enforced on the new primary account. o Audit user roles and permissions o Validate the secure client redirection configurations
Domain 3: Auditing, Monitoring, and Compliance
Subdomain 3.1: Monitor data security.
β Analyze the QUERY_HISTORY and ACCESS_HISTORY views to identify suspicious query patterns and unauthorized data access β Monitor data access and data transfer history: β Monitor the ACCOUNT_USAGE views for information on alert thresholds, correlating events, and incident responses: β Use Snowflake Trail observability features β Map evidence to security frameworks (such as GDPR, HIPAA, etc.) β Manage interfaces for auditors β Integrate external monitoring and observability tools with Snowflake β Trace data access within AI/ML workloads running on Snowpark Container Services β Track changes of the use of secure objects (for example, views, functions, and procedures) β Monitor login history for authentication anomalies, including brute-force attacks and unauthorized access attempts manually, or using Trust Center and external tools β Set up automated alerts and notifications for security events: β Configure email or external integrations for security alerts using tasks and streams
Subdomain 3.2: Implement a strategic security architecture to balance data protection and credit efficiency.
β Compare and contrast the benefits and consequences of enabling or disabling Snowflake security services and features: β Security-related implications β Credit consumption considerations β Operational-overhead implications β Cloud provider implications β Monitor anomalous credit consumption as a critical security signal: β Changes in serverless compute consumption β Credit consumption of advanced features, for example AI, Snowpark and Container Services
Subdomain 3.3: Design and manage data compliance policies.
β Outline how Snowflake's security and governance features support regulatory compliance: o Explain how encryption, access controls, masking, and auditing support regulatory requirements (for example, GDPR, HIPAA, CCPA, and PCI DSS) β Define, enable, and automate audit policies to support compliance reporting β Use Snowflake Trust Center resources to support compliance and security: o Snowflake Compliance Center o Security certifications o Compliance reports
Domain 4: Threats, Risk Assessment, Incident Response, and Forensics
Subdomain 4.1: Perform threat modeling, identification, and analyses.
β Identify and catalog critical assets within Snowflake β Identify and document data entry and exit points β Apply threat modeling methodologies to identify potential threats specific to Snowflake: β Data sharing configurations β Over-privileged roles and users β Compromised service account credentials β Vulnerabilities in 3rd-party connections and packages β Implement mitigation strategies
Subdomain 4.2: Perform risk assessment and manage risk.
β Use Snowflake Horizon Catalog to enable security best practices and compliance β Assess the security of data sharing agreements and configurations with external partners β Analyze vulnerabilities to determine the likelihood and potential impact β Develop, implement, and monitor risk mitigation strategies
Subdomain 4.3: Identify and manage security incidents.
β Configure and test security alerting mechanisms within Snowflake and integrated SIEM platforms β Identify, triage, and contain security incidents: β Monitor Snowflake logs β Investigate alerts from security tools β Triage incoming alerts β Isolate affected user accounts β Revoke compromised credentials or API keys β Implement new or update existing network policies β Suspend data sharing or integration β Manage eradication and recovery: β Identify the root cause of the incident β Remove any malicious access or persisting mechanisms β Restore data from backups, Time Travel, or Fail-safe
Subdomain 4.4: Conduct a post-security-incident forensic analysis.
β Collect and preserve relevant logs and data: β ACCOUNT_USAGE views β Use Time Travel and Fail-safe to access historical states of data β Establish a chain of custody for evidence β Perform a forensic analysis: β Analyze query logs (query_history) to identify what actions were performed β Review access logs (access_history) to determine which tables, views, and columns were read or modified β Examine login history (login_history) to trace the source IP, client application, and authentication methods used β Correlate Snowflake data with logs from other systems (for example, identity provider, network devices) to build an incident timeline
Domain 5: Securing Snowflake Services and Features for AI/ML and Applications
Subdomain 5.1: Secure and govern applications with Snowpark Container Services.
β Design and deploy containerized services using Snowpark Container Services β Understand the security model of compute pools (for example, isolation and network rules for inbound/outbound data) β Manage secrets and EXTERNAL_ACCESS_INTEGRATIONS for controlled external network access from services β Understand the lifecycle management of services and their security implications β Implement secure data access patterns for services running in Snowpark Container Services: o Establish roles and permissions to ensure services access Snowflake data securely o Manage sensitive configurations within service specifications (YAML) β Monitor and troubleshoot security issues within Snowpark Container Services deployments: o Use the SERVICE_USAGE_HISTORY and compute pool monitoring views o Monitor container logs
Subdomain 5.2: Leverage Snowflake Cortex AI to enhance data security.
β Implement content moderation and safety using Cortex Large Language Model (LLM) functions: o Configure COMPLETE() and TRY_COMPLETE() functions to filter content o Use filtered responses (for example, NULL from TRY_COMPLETE()) β Use Cortex functions to classify data and detect anomalies: o Apply CLASSIFY_TEXT() to identify and tag sensitive data categories β Use Cortex AI for data security: o Apply AI Observability features for Gen AI application security o Use LLM-as-a-Judge to evaluate AI application responses for bias, toxicity, and accuracy (relevant to data security and responsible AI) o Interpret traces to debug and audit the flow of sensitive data through Gen AI applications o Monitor AI application performance metrics related to security and data quality β Use Cortex Analyst to support secure data exploration: o Securely configure semantic models o Access Cortex Analyst request logs to audit natural language queries and generated SQL β Configured Cortex Agents to automate security and governance workflows: o Manage Agent orchestration and tool usage o Use Copilot for Snowflake Horizon Catalog to analyze and audit security
Subdomain 5.3: Manage security in Snowflake Native Apps.
β Design and enforce security policies for Native Apps: β Secure, package, and share Native Apps β Use Streamlit in Snowflake application role ownership parameters β Use OAuth to authenticate app users β Implications of running Native Apps in Snowpark Container Services β Implement User-Based Access Control (UBAC) features with Native Apps β Manage permissions for app installation and usage β Secure application code and its dependencies: β App internal code β Third-party packages and libraries β App secrets and credentials
Techniques & products