In Snowflake's data security framework, how does column-level security contribute to the protection of sensitive information? (Select TWO).
Which type of workload is recommended for Snowpark-optimized virtual warehouses?
What happens to the privileges granted to Snowflake system-defined roles?
What happens when a database is cloned?