Free Practice Questions for Snowflake Certification

    πŸ”„ Last checked for updates May 12th, 2026

    Study with 346 exam-style practice questions designed to help you prepare for the Snowflake SnowPro Advanced: Security Engineer. All questions are aligned with the latest exam guide and include detailed explanations to help you master the material.

    Start Practicing

    All Domains

    Practice with randomly mixed questions from all topics

    Question MixAll Topics
    FormatRandom Order

    Domain Mode

    Practice questions from a specific topic area

    Quiz History

    Exam Details

    Key information about Snowflake SnowPro Advanced: Security Engineer

    Official study guide

    View

    Question formats CertSafari offers
    • Multiple choice
    renewal:

    Through Snowflake Continuing Education (CE) program

    prerequisites:

    Active SnowPro Core credential

    target audience:

    Security Administrators, Security Engineers, Snowflake Security Engineers, Security Architects with 2+ years of hands-on data governance and security experience on Snowflake

    estimated study time:

    10 – 13 hours

    certification validity:

    2 years

    Exam Topics & Skills Assessed

    Skills measured (from the official study guide)

    Domain 1: Account and Security

    Subdomain 1.1: Design and implement access control strategies.

    ● Configure and implement Role-Based Access Control (RBAC): β—‹ Automate RBAC management programmatically β—‹ Integrate RBAC management with IdPs using SCIM (user group membership) β—‹ Manage hierarchical RBAC models ● Define and manage custom roles and least-privilege role hierarchies: β—‹ Understand best practices for role design (functional vs. access roles): β–  System-defined roles β–  SNOWFLAKE database roles β–  SNOWFLAKE application roles β–  User-defined custom roles (account, database, and application) β—‹ Manage privilege grants in Snowflake

    Subdomain 1.2: Configure and monitor user authentication and session management.

    ● Implement authenticators, passkeys, and IdP-driven access ● Define, configure, and enforce Multi-Factor Authentication (MFA): β—‹ Snowflake-managed MFA β—‹ Externally-managed MFA ● Implement Single-Sign-On (SSO): β—‹ Configure SAML, and OAuth authentication β—‹ Troubleshoot SSO integration issues ● Manage secure programmatic access: β—‹ Implement key-pair authentication β—‹ Implement Programmatic Access Token (PAT) authentication β—‹ Implement external API authentication and secrets ● Rotate user credentials ● Configure and monitor session policies ● Design and manage leaked password and malicious IP protections

    Subdomain 1.3: Implement network security controls.

    ● Create, implement, and manage network and rules policies: β—‹ Use network rules for granular access control β—‹ Rules policies: IP allow lists and deny lists β—‹ Apply network policies to accounts and users ● Configure and troubleshoot private connectivity and storage integrations: β—‹ AWS PrivateLink, Azure Private Link, and GCP Private Service Connect β—‹ Troubleshoot private connectivity issues ● Support multi-cloud network policy enforcement

    Subdomain 1.4: Manage external access integrations.

    ● Create, implement and manage external access integrations: β—‹ Use network rules to manage allowed external endpoints β—‹ Leverage API authentication integrations β—‹ Establish the order of operations: β–  Perform third-party vendor risk assessment ● Leverage Snowflake secrets for secure authentication with external endpoints: β—‹ OAuth β—‹ Cloud provider tokens β—‹ Passwords β—‹ Generic strings ● Understand best practice recommendations for secure connectivity from Snowflake to external systems: β—‹ Egress proxy configurations β—‹ Configure external functions

    Domain 2: Data Protection, Data Privacy, and Data Governance

    Subdomain 2.1: Implement data security features.

    ● Implement, configure, and manage the customer-managed key component of Tri-Secret Secure ● Implement column-level security β—‹ Design and apply Dynamic Data Masking policies β—‹ Create masking policies with SQL expressions and Snowflake functions β—‹ Manage the masking policy lifecycle: β–  Monitor the impact of policy changes on data visibility ● Use the External Tokenization function ● Use tag-based masking policies ● Use projection policies ● Implement row-access policies: β—‹ Design and apply row-access policies with SQL expressions and Snowflake functions β—‹ Understand policy precedence and interactions β—‹ Manage the row access policy lifecycle: β–  Troubleshoot row access policy enforcement ● Utilize aggregation policies, differential privacy policies, and budgets

    Subdomain 2.2: Manage and audit Secure Data Sharing and collaborations.

    ● Apply advanced privacy controls for shared data: β—‹ Use synthetic data to support privacy ● Configure and manage Snowflake Data Clean Rooms: β—‹ Apply the principles of secure multi-party computation β—‹ Support collaborative analysis without direct data exposure β—‹ Understand the security implications of using secure objects, including views, functions, and procedures ● Configure Data Listings

    Subdomain 2.3: Restrict data exfiltration.

    ● Leverage account-level parameters to restrict the destinations where Snowflake can write data programmatically ● Leverage account-level and user-level parameters to restrict when users can download query result sets

    Subdomain 2.4: Establish and manage data retention and data lifecycle management.

    ● Implement Time Travel and Fail-safe for data recovery: β—‹ Manage Time Travel settings at the table, schema, and account levels β—‹ Understand the differences and use cases for Time Travel and Fail-safe β—‹ Differentiate between Time Travel and Fail-safe in context of security and compliance ● Configure and enforce data retention policies ● Define appropriate retention strategies for structured and semi-structured data: β—‹ Align retention policies with compliance requirements (for example, GDPR and HIPAA) β—‹ Apply retention settings using DDL and governance tools (for example, tagging and policies) ● Manage the data lifecycle using object lifecycle management features: β—‹ Automate data archival and purging using lifecycle management best practices β—‹ Use table metadata and access patterns to determine data aging strategies β—‹ Leverage features including transient tables, temporary tables, and auto-drop configurations

    Subdomain 2.5: Configure object tagging and data classification frameworks.

    ● Use automatic tag propagation, including tag inheritance: o Audit tagging using the TAG_REFERENCES and TAG_REFERENCES_HISTORY views o Visualize data lineage ● Implement data classification: o Configure automatic, custom, and manual classifications o Integrate data classification into data governance policies

    Subdomain 2.6: Configure and maintain data replication policies and procedures.

    ● Manage data replication access control and privileges: o Implement the principle of least privilege for replication-specific roles o Manage and audit privileges such as CREATE REPLICATION GROUP and REPLICATE ● Define and secure ownership of replication and failover group objects ● Manage replication protocols and policies o Configure replication groups to include critical security objects o Replicate network policies to maintain consistent access controls ● Manage the replication of security integrations (SAML2, OAuth, SCIM) to ensure seamless authentication and authorization post-failover ● Validate the replication of users, roles, and grants

    Subdomain 2.7: Manage secure replication and failover operations.

    ● Audit pre-failover readiness: o Conduct periodic audits of replication configurations o Perform controlled tests of the failover process to validate security object promotion and functionality ● Configure Client Redirect ● Execute replication and failover operations: o Monitor audit logs for anomalies during the transition process o Re-establish security configurations for external resources, for example trust relationships for external stages ● Perform a post-failover validation audit: o Verify that replicated network policies and security integrations are active and enforced on the new primary account. o Audit user roles and permissions o Validate the secure client redirection configurations

    Domain 3: Auditing, Monitoring, and Compliance

    Subdomain 3.1: Monitor data security.

    ● Analyze the QUERY_HISTORY and ACCESS_HISTORY views to identify suspicious query patterns and unauthorized data access ● Monitor data access and data transfer history: β—‹ Monitor the ACCOUNT_USAGE views for information on alert thresholds, correlating events, and incident responses: β–  Use Snowflake Trail observability features β–  Map evidence to security frameworks (such as GDPR, HIPAA, etc.) β–  Manage interfaces for auditors ● Integrate external monitoring and observability tools with Snowflake ● Trace data access within AI/ML workloads running on Snowpark Container Services ● Track changes of the use of secure objects (for example, views, functions, and procedures) ● Monitor login history for authentication anomalies, including brute-force attacks and unauthorized access attempts manually, or using Trust Center and external tools ● Set up automated alerts and notifications for security events: β—‹ Configure email or external integrations for security alerts using tasks and streams

    Subdomain 3.2: Implement a strategic security architecture to balance data protection and credit efficiency.

    ● Compare and contrast the benefits and consequences of enabling or disabling Snowflake security services and features: β—‹ Security-related implications β—‹ Credit consumption considerations β—‹ Operational-overhead implications β—‹ Cloud provider implications ● Monitor anomalous credit consumption as a critical security signal: β—‹ Changes in serverless compute consumption β—‹ Credit consumption of advanced features, for example AI, Snowpark and Container Services

    Subdomain 3.3: Design and manage data compliance policies.

    ● Outline how Snowflake's security and governance features support regulatory compliance: o Explain how encryption, access controls, masking, and auditing support regulatory requirements (for example, GDPR, HIPAA, CCPA, and PCI DSS) ● Define, enable, and automate audit policies to support compliance reporting ● Use Snowflake Trust Center resources to support compliance and security: o Snowflake Compliance Center o Security certifications o Compliance reports

    Domain 4: Threats, Risk Assessment, Incident Response, and Forensics

    Subdomain 4.1: Perform threat modeling, identification, and analyses.

    ● Identify and catalog critical assets within Snowflake ● Identify and document data entry and exit points ● Apply threat modeling methodologies to identify potential threats specific to Snowflake: β—‹ Data sharing configurations β—‹ Over-privileged roles and users β—‹ Compromised service account credentials β—‹ Vulnerabilities in 3rd-party connections and packages ● Implement mitigation strategies

    Subdomain 4.2: Perform risk assessment and manage risk.

    ● Use Snowflake Horizon Catalog to enable security best practices and compliance ● Assess the security of data sharing agreements and configurations with external partners ● Analyze vulnerabilities to determine the likelihood and potential impact ● Develop, implement, and monitor risk mitigation strategies

    Subdomain 4.3: Identify and manage security incidents.

    ● Configure and test security alerting mechanisms within Snowflake and integrated SIEM platforms ● Identify, triage, and contain security incidents: β—‹ Monitor Snowflake logs β—‹ Investigate alerts from security tools β—‹ Triage incoming alerts β—‹ Isolate affected user accounts β—‹ Revoke compromised credentials or API keys β—‹ Implement new or update existing network policies β—‹ Suspend data sharing or integration ● Manage eradication and recovery: β—‹ Identify the root cause of the incident β—‹ Remove any malicious access or persisting mechanisms β—‹ Restore data from backups, Time Travel, or Fail-safe

    Subdomain 4.4: Conduct a post-security-incident forensic analysis.

    ● Collect and preserve relevant logs and data: β—‹ ACCOUNT_USAGE views β—‹ Use Time Travel and Fail-safe to access historical states of data β—‹ Establish a chain of custody for evidence ● Perform a forensic analysis: β—‹ Analyze query logs (query_history) to identify what actions were performed β—‹ Review access logs (access_history) to determine which tables, views, and columns were read or modified β—‹ Examine login history (login_history) to trace the source IP, client application, and authentication methods used β—‹ Correlate Snowflake data with logs from other systems (for example, identity provider, network devices) to build an incident timeline

    Domain 5: Securing Snowflake Services and Features for AI/ML and Applications

    Subdomain 5.1: Secure and govern applications with Snowpark Container Services.

    ● Design and deploy containerized services using Snowpark Container Services ● Understand the security model of compute pools (for example, isolation and network rules for inbound/outbound data) ● Manage secrets and EXTERNAL_ACCESS_INTEGRATIONS for controlled external network access from services ● Understand the lifecycle management of services and their security implications ● Implement secure data access patterns for services running in Snowpark Container Services: o Establish roles and permissions to ensure services access Snowflake data securely o Manage sensitive configurations within service specifications (YAML) ● Monitor and troubleshoot security issues within Snowpark Container Services deployments: o Use the SERVICE_USAGE_HISTORY and compute pool monitoring views o Monitor container logs

    Subdomain 5.2: Leverage Snowflake Cortex AI to enhance data security.

    ● Implement content moderation and safety using Cortex Large Language Model (LLM) functions: o Configure COMPLETE() and TRY_COMPLETE() functions to filter content o Use filtered responses (for example, NULL from TRY_COMPLETE()) ● Use Cortex functions to classify data and detect anomalies: o Apply CLASSIFY_TEXT() to identify and tag sensitive data categories ● Use Cortex AI for data security: o Apply AI Observability features for Gen AI application security o Use LLM-as-a-Judge to evaluate AI application responses for bias, toxicity, and accuracy (relevant to data security and responsible AI) o Interpret traces to debug and audit the flow of sensitive data through Gen AI applications o Monitor AI application performance metrics related to security and data quality ● Use Cortex Analyst to support secure data exploration: o Securely configure semantic models o Access Cortex Analyst request logs to audit natural language queries and generated SQL ● Configured Cortex Agents to automate security and governance workflows: o Manage Agent orchestration and tool usage o Use Copilot for Snowflake Horizon Catalog to analyze and audit security

    Subdomain 5.3: Manage security in Snowflake Native Apps.

    ● Design and enforce security policies for Native Apps: β—‹ Secure, package, and share Native Apps β—‹ Use Streamlit in Snowflake application role ownership parameters β—‹ Use OAuth to authenticate app users β—‹ Implications of running Native Apps in Snowpark Container Services β—‹ Implement User-Based Access Control (UBAC) features with Native Apps ● Manage permissions for app installation and usage ● Secure application code and its dependencies: β—‹ App internal code β—‹ Third-party packages and libraries β—‹ App secrets and credentials

    Techniques & products

    RBAC
    IdPs
    SCIM
    System-defined roles
    SNOWFLAKE database roles
    SNOWFLAKE application roles
    User-defined custom roles
    Privilege grants
    Authenticators
    Passkeys
    MFA
    SSO
    SAML
    OAuth
    Key-pair authentication
    Programmatic Access Token (PAT)
    External API authentication
    Secrets
    Session policies
    Leaked password protection
    Malicious IP protections
    Network policies
    Network rules
    IP allow lists
    IP deny lists
    Private connectivity
    Storage integrations
    AWS PrivateLink
    Azure Private Link
    GCP Private Service Connect
    Multi-cloud network policy enforcement
    External access integrations
    Third-party vendor risk assessment
    Egress proxy configurations
    External functions
    Tri-Secret Secure
    Customer-managed key
    Column-level security
    Dynamic Data Masking
    Masking policies
    SQL expressions
    Snowflake functions
    External Tokenization
    Tag-based masking policies
    Projection policies
    Row-access policies
    Aggregation policies
    Differential privacy policies
    Budgets
    Secure Data Sharing
    Synthetic data
    Snowflake Data Clean Rooms
    Secure multi-party computation
    Secure objects (views, functions, procedures)
    Data Listings
    Account-level parameters
    User-level parameters
    Data exfiltration
    Time Travel
    Fail-safe
    Data retention policies
    GDPR
    HIPAA
    DDL
    Object tagging
    Transient tables
    Temporary tables
    Auto-drop configurations
    Tag propagation
    Tag inheritance
    TAG_REFERENCES view
    TAG_REFERENCES_HISTORY view
    Data lineage
    Data classification
    Data governance policies
    Data replication
    Failover
    Least privilege
    CREATE REPLICATION GROUP
    REPLICATE
    Replication groups
    Failover groups
    Security integrations
    Users
    Roles
    Grants
    Client Redirect
    Audit logs
    External stages
    Permissions
    QUERY_HISTORY view
    ACCESS_HISTORY view
    ACCOUNT_USAGE views
    Snowflake Trail
    External monitoring tools
    Observability tools
    AI/ML workloads
    Snowpark Container Services
    Login history
    Trust Center
    Automated alerts
    Tasks
    Streams
    Snowflake security services
    Credit consumption
    Serverless compute
    AI
    Regulatory compliance
    Encryption
    CCPA
    PCI DSS
    Audit policies
    Snowflake Compliance Center
    Security certifications
    Compliance reports
    Threat modeling
    Critical assets
    Data entry/exit points
    Data sharing configurations
    Over-privileged roles
    Compromised credentials
    3rd-party connections
    Mitigation strategies
    Snowflake Horizon Catalog
    Data sharing agreements
    External partners
    Vulnerabilities
    Risk mitigation strategies
    Security alerting mechanisms
    SIEM platforms
    Snowflake logs
    Security tools
    API keys
    Incident timeline
    Compute pools
    EXTERNAL_ACCESS_INTEGRATIONS
    Service specifications (YAML)
    SERVICE_USAGE_HISTORY view
    Container logs
    Snowflake Cortex AI
    LLM functions
    COMPLETE()
    TRY_COMPLETE()
    CLASSIFY_TEXT()
    Gen AI application security
    LLM-as-a-Judge
    AI Observability
    Cortex Analyst
    Semantic models
    Cortex Agents
    Copilot for Snowflake Horizon Catalog
    Snowflake Native Apps
    Streamlit
    User-Based Access Control (UBAC)
    App secrets
    App credentials

    CertSafari is not affiliated with, endorsed by, or officially connected to Snowflake, Inc.. Full disclaimer