Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Snowflake Exam ARA-C01 Topic 6 Question 47 Discussion

Actual exam question for Snowflake's ARA-C01 exam
Question #: 47
Topic #: 6
[All ARA-C01 Questions]

At which object type level can the APPLY MASKING POLICY, APPLY ROW ACCESS POLICY and APPLY SESSION POLICY privileges be granted?

Show Suggested Answer Hide Answer
Suggested Answer: B, D

To ensure that an analyst_user can only access Snowflake from specific IP addresses, the following steps are required:

Option B: This alters the network policy directly linked to analyst_user. Setting a network policy on the user level is effective and ensures that the specified network restrictions apply directly and exclusively to this user.

Option D: Before a network policy can be set or altered, the appropriate role with permission to manage network policies must be used. SECURITYADMIN is typically the role that has privileges to create and manage network policies in Snowflake. Creating a network policy that specifies allowed IP addresses ensures that only requests coming from those IPs can access Snowflake under this policy. After creation, this policy can be linked to specific users or roles as needed.

Options A and E mention altering roles or using the wrong role (USERADMIN typically does not manage network security settings), and option C incorrectly attempts to set a network policy directly as an IP address, which is not syntactically or functionally valid. Reference: Snowflake's security management documentation covering network policies and role-based access controls.


Contribute your Thoughts:

Youlanda
1 months ago
I bet the correct answer is 'All of the above' - because security should be a full-time job, not a part-time policy.
upvoted 0 times
...
Latanya
1 months ago
I'm torn between B and C. Hmm, maybe I should just roll a dice to decide.
upvoted 0 times
Janine
12 days ago
Let's go with schema then.
upvoted 0 times
...
Terry
14 days ago
I believe it's at the database level.
upvoted 0 times
...
Emiko
15 days ago
I think it's at the schema level.
upvoted 0 times
...
...
Xuan
1 months ago
B. Database makes the most sense. That's the highest level of security control I'd expect for these privileges.
upvoted 0 times
Rory
7 days ago
I believe applying these privileges at the table level would offer more granular control over access.
upvoted 0 times
...
Silvana
8 days ago
I think it would be more efficient to manage these privileges at the schema level.
upvoted 0 times
...
Mitsue
1 months ago
I agree, granting these privileges at the database level would provide the most comprehensive security.
upvoted 0 times
...
...
Glendora
2 months ago
D. Table sounds right to me. That's where you'd want to control access and masking at the most granular level.
upvoted 0 times
Tawna
9 days ago
Yeah, table level seems like the best option for controlling access and masking policies.
upvoted 0 times
...
Blythe
1 months ago
I think it would be too broad to grant those privileges at the global level.
upvoted 0 times
...
Claribel
1 months ago
I agree, granting those privileges at the table level makes the most sense.
upvoted 0 times
...
...
Winfred
2 months ago
I believe it's at the table level, as that's where the policies are applied directly to the data.
upvoted 0 times
...
Lindsay
2 months ago
I think the correct answer is C. Schema, as that's where security policies are typically applied.
upvoted 0 times
Tamekia
26 days ago
User 2: Yes, you're right. Those privileges can be granted at the schema level.
upvoted 0 times
...
Tawanna
1 months ago
User 1: I think the correct answer is C. Schema, as that's where security policies are typically applied.
upvoted 0 times
...
...
Ben
2 months ago
I agree with Elke, granting privileges at the schema level makes sense for these policies.
upvoted 0 times
...
Elke
2 months ago
I think the privileges can be granted at the schema level.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77