Q: 15
Which of the following are valid methods for authenticating users for access into Snowflake? (Select
THREE)
Options
Discussion
B D E tbh
B, D, E. SCIM (A) is for provisioning users, not authenticating them-easy to mix that up.
Option B, D, E. Saw this same combo pop up in a practice exam recently.
Nice clear options here, it's B, D, E.
Be respectful. No spam.