Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Google Google-Workspace-Administrator Dumps

Google Cloud Certified - Professional Google Workspace Administrator Questions and Answers

Question 1

Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as “view data for all teams” to the HR group, but it is reporting an error when accessing the application. What should you do?

Options:

A.

Allocate the “view data for all teams” permission to all employees of the company.

B.

Confirm that the Work Insights app is turned ON for all employees.

C.

Confirm in Security > API controls > App Access Controls that Work Insights API is set to “unrestricted.”

D.

Confirm in Reports > BigQuery Export that the job is enabled.

Question 2

You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly.

What should you do?

Options:

A.

Use the bulk upload with CSV feature in the Google Workspace Admin panel to update all Groups.

B.

Update your configuration file and resync mailing lists with Google Cloud Directory Sync.

C.

Create and assign a custom admin role for all group owners so they can update settings.

D.

Use the Groups Settings API to update Google Groups with desired settings.

Question 3

Your organization has users in the United States and Europe For compliance reasons you want to ensure that user data is always stored in the region where the user is located What should you do?

Options:

A.

Create two Google Groups titled "United States' and "Europe " Assign users to either group based on location

B.

Specify a data region policy for each Organizational Unit (OU) where users are grouped by location

C.

Populate the Address field on each user record ensuring the country information is accurate

D.

Do nothing No extra configuration is needed because user data is always stored in the region the user is located

Question 4

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

Options:

A.

Remove Google Workspace license to prevent users from accessing their accounts now.

B.

Suspend users that the organization does not wish to have access.

C.

Add the users to the OU with all services disabled.

D.

Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Question 5

Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.

What security measures should you implement to secure data?

Options:

A.

Use Roles, Script, and Owner access permissions for operations on records and data relations.

B.

Enable App Maker access only for the Finance department Organization Unit.

C.

Use a service account with limited permissions to access each data source.

D.

Change owner access permissions to allow internal usage only.

Question 6

Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.

What two features are essential to reconfigure in Google Workspace? (Choose two.)

Options:

A.

Apps > add SAML apps to your domain.

B.

Reconfigure user provisioning via Google Cloud Directory Sync.

C.

Replace the third-party IDP verification certificate.

D.

Disable SSO with third party IDP.

E.

Enable API Permissions for Google Cloud Platform.

Question 7

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?

Options:

A.

Use the security center to remove the messages from users' mailboxes

B.

Use Google Vault to remove these messages from users mailboxes.

C.

Enable a safety rule to send these types of messages to spam.

D.

Enable a safety rule to send these types of messages to a quarantine.

Question 8

Your company has acquired a new company in Japan and wants to add all employees of the acquisition to your existing Google Workspace domain. The new company will retain its original domain for email addresses and, due to the very sensitive nature of its work, the new employees should not be visible in the global directory. However, they should be visible within each company's separate directory. What should you do to meet these requirements?

Options:

A.

Create a new Google Workspace domain isolated from the existing one, and create users in the new domain instead.

B.

Under Directory Settings > Contact sharing, disable the contact sharing option and wait for 24 hours to allow the settings to propagate before creating the new employee accounts.

C.

Redesign your OU organization to have 2 child OUs for each company directly under the root. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the OU.

D.

Create one dynamic group for each company based on a custom attribute defining the company. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the dynamic group.

Question 9

Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.

While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems. What advice would you give the development team in order to avoid the issue?

Options:

A.

Use the domain-wide delegation API to avoid the limitation per account.

B.

Use an exponential back-off algorithm to retry failed requests.

C.

Switch from REST API to gRPC protocol for performance improvement

D.

Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.

Question 10

Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app.

What should you do?

Options:

A.

For the Finance OU, enable the third-party app in SAML apps.

B.

For the Finance OU, enable the third-party app in Marketplace Apps.

C.

At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.

D.

At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.

Question 11

In your organization, users have been provisioned with either Google Workspace Enterprise, Google Workspace Business, or no license, depending on their job duties, and the cost of user licenses is paid out of each division's budget. In order to effectively manage the license disposition, team leaders require the ability to look up the type of license that is currently assigned, along with the last logon date, for their direct reports.

You have been tasked with recommending a solution to the Director of IT, and have gathered the following requirements:

  • Team leaders must be able to retrieve this data on their own (i.e., self-service).
  • Team leaders are not permitted to have any level of administrative access to the Google Workspace Admin panel.
  • Team leaders must only be able to look up data for their direct reports.
  • The data must always be current to within 1 week.
  • Costs must be mitigated.

What approach should you recommend?

Options:

A.

Export log data to BigQuery with custom scopes.

B.

Use a third-party tool.

C.

Use App Script and filter views within a Google Sheet.

D.

Create an app using AppMaker and App Script.

Question 12

Your organization has a strict requirement that your temporary employees can only send emails to and receive emails from specific external domains You must define a policy in Google Workspace that meets this requirement for users in the temporary employee organizational unit (OU) What should you do?

Options:

A.

Create a policy in Gmail settings that rewrites the recipient for outbound messages and quarantines incoming messages to review before delivery

B.

Add the allowed domains when configuring the restrict delivery setting in Gmail settings, and select the box to bypass for internal emails

C.

Restrict sending and receiving to Google Groups, and carefully curate the temporary employees" memberships

D.

Configure the restrict delivery setting to limit domains that the temporary employees can communicate with Allow Google Docs sharing

Question 13

Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

Options:

A.

Use the login audit report to export all suspicious login details for analysis.

B.

Create a custom dashboard with the security investigation tool showing suspicious logins.

C.

Use the account activity report to export all suspicious login details for analysis.

D.

Create a custom query in BigQuery showing all suspicious login details.

Question 14

You have configured Secure Transport (TLS) Compliance for all messages coming to and from an external domain. altostrat.com. that your end users communicate with via Gmail. What will your end users experience when messages are delivered to them from altostrat.com without TLS enabled?

Options:

A.

The message will be delivered to their spam folder.

B.

The message will not be delivered to the end user in any form.

C.

The user will receive a failure message informing them that the message could not be delivered to their inbox and that they will need to work with their Workspace administrator to resolve the issue.

D.

A warning banner will appear on the message informing the user that the message was not sent securely.

Question 15

Your organization has just completed migrating users to Workspace. Many employees are concerned about their legacy Microsoft Office documents, including issues of access, editing, and viewing. Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features? (Choose two.)

Options:

A.

Configure Context-Aware Access policies to block access to Microsoft Office applications.

B.

Demonstrate the ability to convert Office documents to native Google file format from Drive.

C.

Demonstrate and train users to use the Workspace Migrate tool.

D.

Deliver training sessions that show the methods to access and edit native Office files in Drive, the Workspace file editors, and Drive for Desktop.

E.

Continue to use installed Office applications along with Google Drive for Desktop.

Question 16

Your executive team has asked you to export all available data for 1,200 of your 1,500 Google Workspace Domain users. How should you proceed to export the data with the least amount of effort?

Options:

A.

Perform a search in Google Vault for the 500 users and export all of the results.

B.

Create a shared drive for the exports. Instruct end users to manually use Google Takeout to export the data and place the exported files in the shared drive.

C.

Contact Google Cloud support to perform the export for you.

D.

Contact Google Cloud Support to enable the Data Export tool for your organization, because you have more than 1,000 users, then use the tool to export data for the domain, and remove any unnecessary user data.

Question 17

Multiple users across the organization are experiencing video degradation in Meet video calls. As an administrator, what steps should you take to start troubleshooting?

Options:

A.

Troubleshoot network bandwidth for the organizer of the meeting.

B.

Push the Meet quality tool to end user devices and run local reports to determine connectivity issues.

C.

Locate the Meet quality tool, and review the output for issues with quality.

D.

Update the Admin Console Meet settings to disable streaming.

Question 18

Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.

What should you do?

Options:

A.

Educate users on creating personal contacts for the Partner Employees.

B.

Add a secondary domain for the Partner Company and create user entries for each Partner user.

C.

Create shared contacts in the Directory using the Directory API.

D.

Create shared contacts in the Directory using the Domain Shared Contacts API.

Question 19

A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?

Options:

A.

Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.

B.

Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.

C.

Immediately suspend the user's account, assign an archived user license, and export data.

D.

Suspend the user's account, search all associated users data in Google Vault, and export the data.

Question 20

The security team for your organization is concerned about phishlng attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks?

Choose 2 answers

Options:

A.

Configure spoofing and authentication controls to quarantine messages that are perceived as threats

B.

Train end users to mark messages as spam when they see something suspicious.

C.

Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.

D.

Enforce confidents mode for all messages sent and received from your Workspace domain

E.

Force encryption on all inbound and outbound emails from your Workspace domain.

Question 21

Your client is a multinational company with a single email domain. The client has compliance requirements and policies that vary by country. You need to configure the environment so that each country has their own administrator and no administrator can manage another country.

What should you do?

Options:

A.

Establish a new Google Workspace tenant with their own admin for each region.

B.

Create an OU for each country. Create an admin role and assign an admin with that role per OU.

C.

Create Admin Alerts, and use the Security Center to audit whether admins manage countries other than their own.

D.

Create a Team Drive per OU, and allow only country-specific administration of each folder.

Question 22

You want to create a list of IP addresses that are approved to send email to your domain. To accomplish this, what section of the Google Workspace Admin console should you update?

Options:

A.

Bypass spam filter

B.

Content compliance rule

C.

Approved email denylist

D.

Email allowlist

Question 23

After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.

What should you do?

Options:

A.

Add the legal team to the User Management Admin system role.

B.

Add the legal team to the Google Vault Google Group.

C.

Create a custom role with Google Vault access, and add the legal team.

D.

Create a matter in Google Vault, and share with the legal team.

Question 24

You have implemented a data loss prevention (DLP) policy for a specific finance organizational unit. You want to apply the same security policy to a shared drive owned by the finance department in the most efficient manner. What should you do?

Options:

A.

In the Admin console sharing settings, select the finance organizational unit and deselect Allow users outside the domain to access files in shared drives

B.

Assign the Shared Drive to the finance organizational unit

C.

Create a new DLP policy for shared drive users

D.

Change the scope of the policy to apply to all in the domain

Question 25

Your IT team is being asked to fulfill a query by your organization's legal department that requires an MBOX file that will be shared to a third-party partner for eDiscovery. The query must be run on multiple users. Legal has no admin rights to Google Vault. What should you do to fulfil the request?

Options:

A.

Create a Google Vault matter for each user account, and share the matters to the legal admin.

B.

Create a Google Vault matter, search for data, and run an export for the legal department.

C.

Use the Investigation Too! to search for the data requested, and export for the legal department.

D.

Search for the data in Gmail, and export for the legal department.

Question 26

Four weeks ago. you exported data from Google Vault and emailed the PST export file to your legal admin. They accidentally deleted the PST file and need it sent again. What steps should you take to re-send the PST file to the legal admin?

Options:

A.

Return to the Google Vault export page, and download the ZIP file again.

B.

Return to the Email Log Search page, and download the PST file again.

C.

Ask the legal admin to return to Google Vault to download the PST file again.

D.

Repeat the original search for the original timeframe, and export the data again.

Question 27

The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management.

What should you do?

Options:

A.

Download the Google Workspace roadmap, and work together with a deployment specialist for new features.

B.

Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of Google Workspace.

C.

Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.

D.

Change Google Workspace release track to: Rapid Release for faster access to new features.

Question 28

Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?

Options:

A.

Create a configuration group with the approved users as members, and use it to create a target audience.

B.

Enable external sharing for the marketing and sales organizational units.

C.

Enable external sharing only to allowlisted domains provided by marketing and sales teams.

D.

Create a configuration group with the approved users as members, and enable external sharing for this group.

Question 29

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.

What should you do?

Options:

A.

Run the Transfer Tool for Unmanaged users.

B.

Use a Google Form to survey the Marketing department users.

C.

Assure the VP that there is no action required to configure Google Workspace.

D.

Contact Google Enterprise Support to identify affected users.

Question 30

Users in your organization are routinely complaining that they receive messages containing words of profanity they find inappropriate in a professional setting. As the administrator what steps should you take to prevent the messages from being delivered to users mailboxes?

Options:

A.

Configure an objectionable content rule

B.

Configure an attachment compliance rule

C.

Enable optical character recognition (OCR)

D.

Set up a Gmail DLP policy.

Question 31

Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook. How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?

Options:

A.

Allow external sharing with the auditor using the ‘Trusted Domains’ feature.

B.

Enable the ‘Visitor Sharing’ feature, and demonstrate it to the Finance team.

C.

Use the ‘Publish’ feature in the Sheets editor to share the contents externally.

D.

Attach the Sheet file to an email message, and send to the external auditor.

Question 32

As the Workspace Administrator, you have been asked to configure Google Cloud Directory Sync (GCDS) in order to manage Google Group memberships from an internal LDAP server. However, multiple Google Groups must have their memberships managed manually. When you run the GCDS sync, you notice that these manually managed groups are being deleted. What should you do to prevent these groups from being deleted?

Options:

A.

In the GCDS configuration manager, update the group deletion policy setting to “don't delete Google groups not found in LDAP.”

B.

Use the Directory API to check and update the group’s membership after the GCDS sync is completed.

C.

Confirm that the base DN for the group email address attribute matches the base DN for the user email address attribute.

D.

In the user attribute settings of the GCDS configuration manager options, set the Google domain users deletion/suspension policy to “delete only active Google domain users not found in LDAP.”

Question 33

Your default Vault retention policy for Gmail is set to 365 days Your legal department has just informed you that emails sent and received by the customer support department are sensitive and must be retained for only 30 days You must enforce this new retention policy in the simplest way What should you do?

Options:

A.

Change the current default retention policy in Vault for Gmail to 30 days and apply it to the customer support organizational unit (OU) Configure a custom retention policy for Gmail for 365 days for your domain

B.

Create two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

C.

Change the current default retention policy for Gmail to 30 days Configure two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

D.

Create a custom retention policy in Vault for Gmail for 30 days and apply it to the customer support organizational unit (OU)

Question 34

The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified

as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue.

What two actions should you take? (Choose two.)

Options:

A.

Obtain the message header and analyze using Google Workspace Toolbox.

B.

Review the contents of the messages in Google Vault.

C.

Set up a Gmail routing rule to whitelist the sender.

D.

Conduct an Email log search to trace the message route.

E.

Validate that your domain is not on the Spamhaus blacklist.

Question 35

Your organization is planning to remove any dependencies on Active Directory (AD) from all Cloud applications they are using You are currently using Google Cloud Directory Sync (GCDS) with on-premises AD as a source to provision user accounts in Google Workspace. Your organization is also using a software-as-a-service (SaaS) human resources information system (HRIS) that offers integration via CSV export and Open API standard.

Additional requirements for the solution include:

• It should not require a subscription to any additional third-party service.

• The process must be automated from beginning to end.

You are tasked with the design and implementation of a solution to address user provisioning with these requirements.

What solution should you implement?

Options:

A.

Set up Azure AD and federate on-premises AD with it. Provision user accounts from Azure AD with the Google-recommended process.

B.

Modify the GCDS configuration to use the HRIS application as the data source and complete any necessary adjustments

C.

Export HRIS data to a CSV file every day. and build a solution to define the delta with the previous day;

import the result as a CSV file via the Admin console.

D.

Build an application that will fetch updated data from the HRIS system via Open API. and then update

Google Workspace with the Directory API accordingly.

Question 36

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.” You are responsible for making sure that users cannot remove the footer.

What should you do?

Options:

A.

Send an email to each sales person with the instructions on how to add the footer to their Signature.

B.

Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.

C.

Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.

D.

Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.

Question 37

Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail. What should you do to protect your users from future unknown malware in email attachments?

Options:

A.

Run queries in Security Investigation Tool.

B.

Turn on advanced phishing and malware protection.

C.

Enable Security Sandbox.

D.

Enable Gmail confidential mode.

Question 38

The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's defense-in-depth strategy?

Options:

A.

Implement an IP block on the malicious user's IPs under Security Settings in the Admin Console.

B.

Use Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.

C.

Enforce higher complexity passwords by rolling it out to the affected users.

D.

Use Mobile device management geo-fencing to prevent malicious actors from using these stolen credentials.

Question 39

Your organization is concerned with the increasing threat of phishing attacks that may impact users.

Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

Options:

A.

Enable Enforce Strong Password policy.

B.

Enable Employee ID Login Challenge.

C.

Decrease the Maximum User Session Length.

D.

Revoke token authorizations to external applications.

Question 40

You work for a midsize organization Your compliance and audit learn sees that users are frequently resetting their passwords You must provide accurate information and ensure that the compliance team is informed every time a user changes their password What should you do?

Options:

A.

Create a new alert by using user log events and check that event Login type is Google password and include the compliance team in the email notifications

B.

Check the User's password changed alert in the alert center and include the compliance team in the email notifications

C.

Disable user account recovery so users must contact you before a reset

D.

Enable user account recovery and forward any alert to the compliance team through the alert center

Question 41

Your organization wants to grant Google Vault access to an external regulatory authority. In an effort to comply with an investigation, the external group needs the ability to view reports in Google Vault. What should you do?

Options:

A.

Create accounts for external users and assign Vault privileges.

B.

Share Vault access with external users.

C.

Assign an Archived User license to the external users.

D.

Temporarily assign the super admin role to the users

Question 42

You received this email from the head of marketing:

Hello Workspace Admin:

Next week, a new consultant will be starting on the "massive marketing mailing" project. We want to ensure that they can view contact details of the rest of the marketing team, but they should not have access to view contact details of anyone else here at our company. Is this something that you can help with?

What are two of the steps you need to perform to fulfill this request?

Choose 2 answers

Options:

A.

Create an isolated OU for the consultants who need the restricted contacts access.

B.

Create a group that includes the contacts that the consultant is allowed to view.

C.

Apply the role of owner to the consultant in the group settings.

D.

Create the consultant inside under the marketing OU.

E.

Ensure that you are assigned the Administrator Privilege of Services > Services settings, and ensure that Services > Contacts > Contacts Settings Message is set.

Question 43

Your company is using Google Workspace Business Standard. The company has five meeting rooms that are all registered as resources in Google Workspace and used on a daily basis by the employees when organizing meetings. The office layout was changed last weekend, and one of the meeting rooms is now a dedicated room for management. The CEO is complaining that anyone can book the room and requested this room to be used only by the management team and their executive assistants (EAs). No one else must be allowed to book it via Google Calendar. What should you do?

Options:

A.

As a super administrator, modify the room calendar sharing settings, and limit it to the management and EAs group.

B.

Delete the room from Google Workspace resources, and suggest using a spreadsheet shared with the management and EAs only for the room schedule.

C.

As a super administrator, create a group calendar named “Management Room,” and share it only with the management and the EAs.

D.

Move the room resource to the management and EAs group so that only they can use it.

Question 44

The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing.

What should you do?

Options:

A.

Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.

B.

Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.

C.

Create two Drive Audit Alerts, one for each user, where the Visibility is “Shared Externally,” and email them to the Director.

D.

Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.

Question 45

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?

What should you do?

Options:

A.

Create a report using the OAuth Token Audit Activity logs.

B.

Create a report using the Calendar Audit Activity logs.

C.

Create a report using the Drive Audit Activity logs.

D.

Create a reporting using the API Permissions logs for Installed Apps.

Question 46

Your organization is in the process of deploying Google Drive for desktop so that your users can access Drive files directly from their desktops. For security reasons, you want to restrict Drive for desktop to only company-owned devices. What two steps should you take from the admin panel to restrict Drive for desktop to only company-owned devices?

Choose 2 answers

Options:

A.

Create a company-owned device inventory using an asset tag.

B.

Devices > Endpoints > Add a filter-> Management Type > Drive for desktop > Apply

C.

Apps > Google Workspace > Drive and Docs > Features and Applications > Google Drive for Desktop > Only Allow Google Drive for desktop on authorized devices

D.

Install the Google Endpoint Verification extension on machines using Drive for Desktop.

E.

Create a company-owned device inventory using serial numbers of devices.

Question 47

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?

Options:

A.

Delete the user's account in the Admin Console.

B.

Transfer data between end user Workspace accounts.

C.

Instruct a Google Vault admin to create a matter, and place all the user data on ‘hold.’

D.

Use Google Vault to export all the user data and share among the security team.

Question 48

Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)

Options:

A.

Provide your current GCDS instance with admin credentials to the recently acquired organization's LDAP directory.

B.

Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.

C.

Set up exclusion rules to ensure that users synced from the acquired organization's LDAP are not, suspended.

D.

Set up an additional instance of GCDS running on another server, and handle the acquired organization's synchronization.

E.

Upgrade to the multiple LDAP version of GCDS.

Question 49

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?

Options:

A.

Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.

B.

Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.

C.

Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.

D.

Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.

Question 50

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching in preparation for the risk assessment you want to quickly review all the security-related settings for Gmail, Drive and Calendar and identify the ones that may be posing risk What should you do?

Options:

A.

Review all the alerts in the Alert center

B.

Review the Security health page in the Admin console

C.

Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps

D.

Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.

Question 51

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?

Options:

A.

Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.

B.

Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.

C.

Set the option "Allow calendar-based room release" for all targeted rooms.

D.

Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.

Question 52

You are supporting an investigation that is being conducted by your litigation team. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user’s awareness.

What two actions should you take? (Choose two.)

Options:

A.

Move the user to their own Organization Unit, and set a custom retention policy

B.

Create a matter using Google Vault, and share the matter with the litigation team members.

C.

Create a hold on the user’s mailbox in Google Vault

D.

Reset the user's password, and share the new password with the litigation team.

E.

Copy the user's data to a secondary account.

Question 53

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.

What should you do?

Options:

A.

Turn on password expiration.

B.

Enforce 2FA with a physical security key.

C.

Use a third-party identity provider.

D.

Enforce 2FA with Google Authenticator app.

Question 54

A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges.

You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs.

What two actions should be taken on this call with the user? (Choose two.)

Options:

A.

Ask the user to send an email to you so you can check the headers.

B.

Record a HAR file of the user composing a new email.

C.

Take screenshots of the user’s screen when composing an email.

D.

Use the Email log search in the Admin panel.

E.

Check the Users > App Users Activity report.

Question 55

Your organization is expected to start using Google Workspace Enterprise Standard in several countries. During the planning phase, the change management leadership team mandates that meeting rooms near each participant’s office location should be suggested when someone creates a Google Calendar event, to simplify the user experience and avoid booking rooms when people would not be able to move easily. What should you do?

Options:

A.

Organize users for each location in separate organizational units (OUs). Add room resources to the corresponding OUs so that meeting rooms would be suggested accordingly.

B.

Organize users for each location in separate Google Groups. Add room resources to the corresponding groups so that meeting rooms would be suggested accordingly.

C.

Share each room only with the Dynamic Group defined per each user location so that they can only book the rooms nearby.

D.

Define users' work locations by setting building ID. floor name, and floor section if applicable as the-buildings and rooms are defined.

Question 56

Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in Google Workspace Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error.

What should you do?

Options:

A.

Install Google Cloud Directory Sync on all Domain Controllers.

B.

Install Google Workspace Sync for Microsoft Outlook on all employees’ computers.

C.

Install Google Cloud Directory Sync on a supported server.

D.

Install Google Apps Manager to automate add-user scripts.

Question 57

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your- company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.

What steps should you take?

Options:

A.

Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.

B.

Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.

C.

Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.

D.

Set up a Default route with split delivery to route email to the on-premises server.

Question 58

A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?

Options:

A.

Download and attach the documents to a Gmail message, and send them to the external vendor.

B.

Move all users from the finance org unit to the HR org unit.

C.

Enable ‘Visitor Sharing’ for the entire finance org unit.

D.

Create a group with the finance and HR users who need to share externally.

Question 59

You have enrolled a new Google Meet hardware device for an existing conference room in your building Your users report that the new hardware in the conference does not show the expected calendar events You need to investigate and fix the problem What should you do?

Options:

A.

Make sure that the conference room resource calendar has been created and that the Meet Hardware is associated with that resource

B.

Create a brand new resource calendar and associate the Meet Hardware with that new resource

C.

Use the Meet Quality Tool in the control panel to search for the newly installed Meet Hardware

D.

Make sure the Access permissions for the resource calendar is set to "See all event details

Page: 1 / 20
Total 197 questions