Which actions can be performed using a resource monitor in Snowflake? (Select TWO).
What happens when a network policy includes values that appear in both the allowed and blocked IP address list?
What is the default access of a securable object until other access is granted?
Which type of URL gives permanent access to files in cloud storage?
User-level network policies can be created by which of the following roles? (Select TWO).