
Explanation:
The correct answer is A because Snowflake's network security for private connectivity is primarily managed through network policies that allow specifying allowed IP addresses (IPv4) or CIDR blocks. This is the standard Snowflake feature for controlling network access. Option B is incorrect as Snowflake URLs don't require allowlisting for GET method responses. Option C is incorrect because vulnerability patch management is handled by Snowflake, not manually by customers. Option D is incorrect as customers don't manually set up IPS on each account - this is part of Snowflake's managed security infrastructure. The community discussion shows 100% consensus on answer A with upvoted comments confirming this approach.
Ultimate access to all questions.
No comments yet.
How is network and security for private connectivity managed in Snowflake?
A
By setting up network policies with IPv4 IP addresses
B
By putting the Snowflake URL on the allowed list for get method responses
C
By manually setting up vulnerability patch management policies
D
By manually setting up an Intrusion Prevention System (IPS) on each account