Free Practice Questions for Snowflake ADA-C02 Certification
Study with 479 exam-style practice questions designed to help you prepare for the Snowflake SnowPro Advanced: Administrator (ADA-C02). All questions are aligned with the latest exam guide and include detailed explanations to help you master the material.
Start Practicing
Random Questions
Practice with randomly mixed questions from all topics
Domain Mode
Practice questions from a specific topic area
Exam Information
Exam Details
Key information about Snowflake SnowPro Advanced: Administrator (ADA-C02)
associate (intermediate)
Through Snowflake Continuing Education (CE) program, including eligible Snowflake Instructor Led (ILT) Training Courses or earning an equivalent or higher-level SnowPro Certification.
Active SnowPro Core Certified credential
2+ years of Snowflake Data Cloud Administrative experience, including practical, hands-on experience using Snowflake. Fluency with ANSI and Snowflake extended SQL. Designed for Snowflake Administrators, Snowflake Data Cloud Administrators, Cloud Infrastructure Administrators, Database Administrators, Cloud Data Administrators, Application Developers.
10 – 13 hours
2 years
Exam Topics & Skills Assessed
Skills measured (from the official study guide)
Domain 1: Snowflake Security, Role-Based Access Control (RBAC), and User Administration
Subdomain 1.1: Manage administrative roles
• Identify use cases and follow best practices for ORGADMIN and ACCOUNTADMIN roles (note: ORGADMIN will be replaced with GLOBARORGADMIN ) • Analyze the impact of organizational-level changes on account-level objects
Subdomain 1.2: Given a set of business requirements, design access control framework
• Identify use cases for the different frameworks
- Discretionary Access Control (DAC) - Role-Based Access Control (RBAC) - User-based access Control (UBAC)
• Determine the use cases for, and hierarchy of, system-defined roles • Determine the use cases for custom security roles • Analyze the implications of role inheritance when granting or revoking privileges • Grant access to specific objects within a database that require privilege inheritance
Subdomain 1.3: Given a scenario, create and manage access control.
• Identify and apply different privileges available for each object type • Custom security roles and users (SHOW command) • Analyze and audit user and query activity history using the ACCOUNT_USAGE and ORGANIZATION_USAGE schemas
Subdomain 1.4: Given a scenario, fine-tune access controls.
• Secure the ACCOUNTADMIN role • Use and manage database roles and use cases • Create custom roles • Determine use cases for primary and secondary roles • Align usage of object access with business functions • Manage cloned objects and their impact on granted privileges • Create additional Administrators • Monitor granted privileges to users and roles, and on objects • Implement and manage future grants including restrictions • Manage warehouse grants (for example, USAGE , OPERATE , MODIFY , MONITOR ) • Implement and manage managed access schemas • Provide access to non-account Administrators to monitor billing and usage information • Manage account-level permissions • Enable security and access control for AI/ML models
Subdomain 1.5: Set up and manage Snowflake authentication.
• Establish federated authentication and Single Sign-on (SSO) to Snowflake
- Configure an Identity Provider (IdP) for Snowflake - Configure, use, and manage federated authentication with Snowflake
• Implement and manage passwords and multi-factor authentication (MFA)
- Manage user types ( PERSON , NULL and SERVICE ) - Manage passwords and password policies - Manage user MFA enrollment - Manage key-pair authentication and rotation - Manage programmatic authentication tokens and rotation - Report on users who do not have MFA enabled - Reset passwords and temporarily disable MFA for users
• Configure and use OAuth protocols
- Use OAuth 2.0 in Snowflake - Compare Snowflake OAuth to External OAuth - Configure Snowflake OAuth for custom clients - Analyze how Snowflake OAuth is impacted by federated authentication, network policies, and private connectivity
Subdomain 1.6: Set up and manage network and private connectivity.
• Establish network rules
- Configure and manage network rules - Analyze network policy behavior when both account-level and user-level network rules exist
• Establish private connectivity to Snowflake internal stages and the Snowflake service
- Implement and manage cloud provider interfaces and private endpoints for internal stages - Manage private connectivity between cloud providers and Snowflake
• Secure and Integrate the Snowflake SQL API
Subdomain 1.7: Set up and manage security administration and authorization.
• Use and monitor SCIM
- Analyze SCIM and its use cases as they relate to Snowflake - Manage users and groups with SCIM - Enable, configure, and manage SCIM integration
• Prevent data exfiltration with PREVENT_UNLOAD_TO_INLINE_URL and REQUIRE_STORAGE_INTEGRATION _FOR_STAGE_CREATION • Manage service accounts, API integration, and automated authentication (for example, key-pair authentication) • Manage access to AI features and models
Domain 2: Account Management and Data Governance
Subdomain 2.1: Manage organizations and accounts.
• Evaluate the benefits and costs of using a Snowflake Organization • Perform organizational tasks
- Create and name an organization - Name various types of organization accounts - Identify which regions are available for a given organization
• Perform account tasks
- View, create, and list accounts - Change account names
• Manage Tri-Secret Secure • Manage encryption keys in Snowflake
- Describe how Snowflake encrypts customer data - Describe encryption key rotation and periodic rekeying configuration
• Manage account-level parameters and features
- Enable Cortex AI features for users
Subdomain 2.2: Implement and manage data governance in Snowflake.
• Protect sensitive data with security policies
- Implement column-level security using data masking policies - Use external tokenization - Evaluate the use of data masking versus external tokenization based on business requirements - Configure a row access policy on an object - Compare row access policies to secure views - Identify the impact of attaching a row access policy to an object
• Audit access history using the ACCESS_HISTORY views • Use tagging and classification in Snowflake
- Identify tagging use cases - Implement and manage tagging - Implement tag-based masking policies - Implement data classification (EXTRACT_SEMANTIC_CATEGORIES, ASSOCIATE_SEMANTIC_CATEGORIES)
• Manage data governance through Snowsight
- Configuring and monitor tags - Implement and manage Trust Center
• Manage Horizon Catalog, Universal Search, and Data Lineage
Subdomain 2.3: Given a scenario, manage account identifiers.
• Differentiate between account names and account locators • Identify when a given account identifier needs to be used • Use region IDs and region groups
Domain 3: Data and Object Management
Subdomain 3.1: Given business requirements, design, manage, and maintain virtual warehouses.
• Analyze the impact on data loading and query processing based on warehouse sizes and types • Configure warehouse properties (auto-suspend, auto-resume, max clusters) • Given a scenario, manage warehouse usage in sessions, and size the warehouse accordingly • Given a scenario, manage a multi-cluster warehouse
- Determine use cases and benefits - Implement and maintain a scaling policy - Monitor multi-cluster warehouses
Subdomain 3.2: Given a scenario, manage databases, tables, and views.
• Manage tables
- Analyze table design considerations - Implement Snowflake table structures and types - Create and manage external tables - Create and manage iceberg tables
• Implement and manage views, secure views, and materialized views • Identify use cases for cloning databases and tables
Subdomain 3.3: Given a scenario, stage data in Snowflake.
• Create and manage Snowflake storage integration
- External stages - Data exfiltration
• Create and manage EXTERNAL_VOLUME with Iceberg tables • Create and configure the Polaris Catalog
Subdomain 3.4: Given a scenario, manage tasks.
• Configure tasks
- Manage and schedule tasks - Set permissions for creating and executing tasks - Troubleshoot task historical runs - Identify use cases
• Differentiate between user-managed and Snowflake-managed tasks and identify use cases.
Subdomain 3.5: Perform queries in Snowflake .
• Use Snowflake sequences and identify limitations • Use persisted query results • Cancel statements for single users or multiple users • Use query history filters including client-generated queries and queries executed by user tasks • Visualize query results with Snowsight
- Use Snowsight dashboards to monitor activity - Share worksheets and dashboards - Generate and share Snowsight charts - Identify constraints with sharing a Snowsight chart - Recover dropped dashboards
Domain 4: Performance Monitoring and Tuning
Subdomain 4.1: Monitor and analyze Snowflake performance.
• Evaluate and interpret Query Profiles to improve performance
- Analyze the components of the Query Profile: - Steps - Operator tree - Operator nodes - Operator types - Compare compile versus runtime optimizations - Identify and create efficient queries - Articulate the execution path - Use effective joining conditions - Perform grouping, sorting, and ordering - Troubleshoot common query performance issues - Identify impact and solutions for data spilling - Identify impact and solutions if data pruning is not happening - Identify the various timeout parameters
• Use an explain plan • Compare and contrast different caching techniques and the impact of caching on performance
- Result cache - Local disk (warehouse) cache - Explain the impact on the local disc cache when a warehouse is suspended or resumed - Metadata cache
• Implement performance improvements
- Recommend the use of materialized views - Use the search optimization service - Create external tables - Use data caching - Use the query acceleration service
Subdomain 4.2: Manage DML locking and concurrency in Snowflake.
• Analyze DML concurrency considerations • Implement best practices for DML locking and concurrency • Monitor and manage transaction activity
Subdomain 4.3: Given a scenario, implement resource monitors.
• Create and manage resource monitors based on use cases and business requirements • Set up a dashboard to monitor Snowflake costs
Subdomain 4.4: Enable and manage logging and tracing.
• Manage event tables
- Consider the use of default system event tables compared to custom tables - Configure event tables - Set levels for logs, metrics and tracing
• Analyze event tables for system health indicators • Use log data to monitor user activity, threat detection, and access control
- Create alerts
• Use log trace data to perform root cause analyses • Use log trace data to optimize performance
Subdomain 4.5: Manage and optimize costs.
• Manage organization costs
- Differentiate use cases for the ACCOUNT_USAGE and ORGANIZATION_USAGE views - Monitor accounts and usage - Use the ORGANIZATION_USAGE schema in the SNOWFLAKE shared database - Monitor and calculate data transfer costs and replication costs - Calculate data storage usage and credit consumption - Apply techniques for cost optimization
• Evaluate use cases for the ACCOUNT_USAGE and INFORMATION_SCHEMA
- Views available from the INFORMATION_SCHEMA - Latency and data retention considerations - Latency for historical views
• Manage costs for virtual warehouses
- Determine when warehouses should be suspended or resumed based on cost and pricing - Calculate warehouse usage and credit consumption - Demonstrate cost saving strategies - Calculate and minimize IDLE time cost - Use Budgets - Use WAREHOUSE_MONITORING to optimize costs - Monitor and assess automatic clustering usage
• Manage costs for serverless and AI features
- Analyze how Snowflake credits are consumed by the cloud services layer (such as Snowpipe, materialized views, and automatic clustering) - Monitor AI and ML function costs - Monitor Notebooks consumption - Monitor AI usage and costs
Domain 5: Data Sharing and Snowflake Marketplace
Subdomain 5.1: Implement and manage data sharing.
• Given a scenario, implement sharing solutions
- Evaluate different sharing models (one to one, one to many, private, public) - Share data among different Snowflake editions - Configure cross-region and cross-cloud data sharing - Explain the role of replications - Use Cross-cloud auto fulfillment for listings - Use Cross-cloud Data Governance - Configure data sharing programmatically - Share different types of data objects including secure functions - Determine the role of context functions in data sharing
• Manage data providers and consumers
- Create and maintain outbound data shares - Share objects securely in a data share (for example, what type to use) - Identify use cases for views and secure views - Share data with secure User-defined Functions (UDFs) - Create and maintain reader accounts - Create user and role for access - Create resource monitors - Create objects - Determine if there is a need to store data (CREATE DATABASE ) - Import and maintain inbound data shares
• Configure and manage Snowflake Data Clean Rooms
- Install the clean room native app - Bring users into the clean room - Manage collaborators
Subdomain 5.2: Implement and manage the Snowflake Marketplace
• Access the public and internal Marketplace • Determine use cases for internal versus public data listings • Manage the process of becoming a data provider
- Create, edit, or delete provider profiles
• Create, submit, manage, and modify a data listing • Manage listings and listing requests • Monitor data sharing usage • Manage Native Apps
Domain 6: Disaster Recovery, Backup, and Data Replication
Subdomain 6.1: Manage data replication.
• Differentiate the use cases for primary and secondary databases • Replicate database objects • Replicate account-level objects • Analyze the impact of replication on access controls • Perform account replication • Enable scheduled replication • Differentiate between replication Groups and failover groups • Given a scenario, determine account replication considerations with respect to the different Snowflake editions
- Replicate data to a lower Snowflake edition
• Identify key-considerations for account replications • Analyze the impact of account replication on:
- Automatic clustering - Materialized views - External tables - Policies (masking and row access) and tags - Streams and tasks - Stages, pipes, and clones objects - Historical usage data - Iceberg tables
• Analyze the impact of database failover across multiple accounts • Analyze the impact of database failover and failback on schemas • Redirect client connections in case of a failover • Design and implement disaster recovery and business continuity plans
- Identify the appropriate failover or failback procedure
• Implement best practices for backups in Snowflake
Subdomain 6.2: Given a scenario, manage Snowflake Time Travel and Fail-safe.
• Establish data retention periods • Query historical data • Restore dropped objects • Enable or disable Time Travel
- Analyze Snowflake edition implications for Time Travel
Techniques & products