Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Google Google-Workspace-Administrator Dumps

Google Cloud Certified - Professional Google Workspace Administrator Questions and Answers

Question 1

NO: 161

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching in preparation for the risk assessment you want to quickly review all the security-related settings for Gmail, Drive and Calendar and identify the ones that may be posing risk What should you do?

Options:

A.

Review all the alerts in the Alert center

B.

Review the Security health page in the Admin console

C.

Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps

D.

Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.

Question 2

Your organization is moving from a legacy mail system to Google Workspace This move will happen in phases During the first phase, some of the users in the domain are set up to use a different identity provider (IdP) for logging in You need to set up multiple idPs for various users What should you do?

Options:

A.

Enable single sign-on (SSO) with third-party identity providers and exclude the users who are using a different provider

B.

Enable single sign-on (SSO) with Cloud Identity and use Cloud Directory Sync to manage multiple identity providers

C.

Create Security Assertion Markup Language (SAML) based single sign-on (SSO) profiles and assign them to specific organizational units or groups of users.

D.

Nothing Google uses cookies to establish a user's relationship to a device This will cover multiple identity providers

Question 3

You work for a midsize organization Your compliance and audit learn sees that users are frequently resetting their passwords You must provide accurate information and ensure that the compliance team is informed every time a user changes their password What should you do?

Options:

A.

Create a new alert by using user log events and check that event Login type is Google password and include the compliance team in the email notifications

B.

Check the User's password changed alert in the alert center and include the compliance team in the email notifications

C.

Disable user account recovery so users must contact you before a reset

D.

Enable user account recovery and forward any alert to the compliance team through the alert center

Question 4

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these new users, without updating the information of pre­existing users?

Options:

A.

Add the acquired domain as an alias to the primary Google Workspace domain.

B.

Add the acquired domain as a secondary domain to the primary Google Workspace domain, and then update the email information of all new users with alias emails.

C.

Update the Google-provided test domain to be the domain of the acquired company, and then update the email information of all new users with alias emails.

D.

Without adding a domain, update each user's email information with the previous domain.

Question 5

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available.

What should you do?

Options:

A.

Set up unmanaged Chromeboxes and set the executives’ homepage to meet.google.com via Chrome settings.

B.

Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.

C.

Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives’ calendars.

D.

Provision managed Chromeboxes and set the executives’ Chrome homepage to meet. google.com via device policy.

Question 6

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?

What should you do?

Options:

A.

Create a report using the OAuth Token Audit Activity logs.

B.

Create a report using the Calendar Audit Activity logs.

C.

Create a report using the Drive Audit Activity logs.

D.

Create a reporting using the API Permissions logs for Installed Apps.

Question 7

The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified

as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue.

What two actions should you take? (Choose two.)

Options:

A.

Obtain the message header and analyze using Google Workspace Toolbox.

B.

Review the contents of the messages in Google Vault.

C.

Set up a Gmail routing rule to whitelist the sender.

D.

Conduct an Email log search to trace the message route.

E.

Validate that your domain is not on the Spamhaus blacklist.

Question 8

The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?

Options:

A.

Configure a safety rule to protect against encrypted attachments from untrusted senders

B.

Configure a safety rule to protect against attachments with scripts from untrusted senders.

C.

In the security sandbox section, enable virtual execution of attachments for (he targeted OU

D.

In the security sandbox section, enable virtual execution of attachments for the entire organization.

Question 9

Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.

What should you do?

Options:

A.

Enable additional security verification via email.

B.

Enable authentication via the Google Authenticator.

C.

Deploy browser or device certificates via Google Workspace.

D.

Configure USB Yubikeys for all users.

Question 10

Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Workspace data should be stored in a separate backup environment.

How should you store data for this situation?

Options:

A.

Use routing rules to dual-deliver mail to an on-premises SMTP server and Google Workspace.

B.

Write a script and use Google Workspace APIs to access and download user data.

C.

Use a third-party tool to configure secure backup of Google Workspace data.

D.

Train users to use Google Takeout and store their archives locally.

Question 11

Your company has numerous locations throughout the world. Each of these locations has multiple office managers that field questions from employees through an email alias. Some questions have not been answered by an office manager How can you create a system to assign conversations to different receptionists using Workspace?

Options:

A.

Create a Google Groups Collaborative Inbox.

B.

Use App Script to design a ticketing system that marks conversation ownership.

C.

Contract with a third-party solution, such as ServiceNow.

D.

Create Google Tasks and assign them to receptionists to address unanswered questions.

Question 12

A user named Alice is leaving your organization You need to transfer all of Alice's data from her Drive to Bob's Drive in the most simple and efficient manner possible What should you do?

Options:

A.

Use the Google Admin console to move the files from Alice's Drive to Bob's Drive

B.

Use the Google Takeout service to export Alice's data to a zip file and instruct Bob to import the zip file into his Drive

C.

Use the Google Drive API to programmatically transfer the files from Alice's Drive to Bob's Drive

D.

Instruct Alice to download all of her files from her Drive and upload them to Bob's Drive

Question 13

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your- company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.

What steps should you take?

Options:

A.

Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.

B.

Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.

C.

Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.

D.

Set up a Default route with split delivery to route email to the on-premises server.

Question 14

Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.

What security measures should you implement to secure data?

Options:

A.

Use Roles, Script, and Owner access permissions for operations on records and data relations.

B.

Enable App Maker access only for the Finance department Organization Unit.

C.

Use a service account with limited permissions to access each data source.

D.

Change owner access permissions to allow internal usage only.

Question 15

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.” You are responsible for making sure that users cannot remove the footer.

What should you do?

Options:

A.

Send an email to each sales person with the instructions on how to add the footer to their Signature.

B.

Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.

C.

Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.

D.

Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.

Question 16

Your organization has offices in Canada Italy and the United States You want to ensure that employees can access corporate Gmail and Drive from these three geographic locations only What should you do?

Options:

A.

Require the use of corporate devices for any access to corporate Gmail and Drive

B.

Use context-aware access to create access levels based on the geographic location and assign them to corporate Gmail and Drive

C.

Create address lists to restrict the delivery of incoming and outgoing messages and to block notifications from Google Doc comments

D.

Create data protection rules in Google Workspace that allow data access from only three geographic locations

Question 17

Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit.

What should you do?

Options:

A.

From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.

B.

From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.

C.

From the Google Workspace Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.

D.

From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.

Question 18

As the Workspace Administrator, you have been asked to configure Google Cloud Directory Sync (GCDS) in order to manage Google Group memberships from an internal LDAP server. However, multiple Google Groups must have their memberships managed manually. When you run the GCDS sync, you notice that these manually managed groups are being deleted. What should you do to prevent these groups from being deleted?

Options:

A.

In the GCDS configuration manager, update the group deletion policy setting to “don't delete Google groups not found in LDAP.”

B.

Use the Directory API to check and update the group’s membership after the GCDS sync is completed.

C.

Confirm that the base DN for the group email address attribute matches the base DN for the user email address attribute.

D.

In the user attribute settings of the GCDS configuration manager options, set the Google domain users deletion/suspension policy to “delete only active Google domain users not found in LDAP.”

Question 19

You work at a large global holding firm with multiple companies that are united under one Google Workspace deployment. You must ensure that employees can only access documents at the company in which they are employed What should you do?

Options:

A.

Create a User group for each company and change Google Drive sharing settings to block external sharing

B.

Create an organizational unit (OU) for each company and disable file sharing.

C.

Set up data loss prevention (DLP) rules to prevent specific documents from being shared

D.

Set up Google Drive trust rules to prevent access to documents from individual companies

Question 20

Your marketing department needs an easy way for users to share items more appropriately. They want to easily link-share Drive files within the marketing department, without sharing them with your entire company. What should you do to fulfil this request? (Choose two.)

Options:

A.

Create a shared drive that's shared internally organization-wide.

B.

Update Drive sharing for the marketing department to restrict to internal.

C.

Create a shared drive for internal marketing use.

D.

Update the link sharing default to the marketing team when creating a document.

E.

In the admin panel Drive settings, create a target audience that has all of marketing as members.

Question 21

You received this email from the head of marketing:

Hello Workspace Admin:

Next week, a new consultant will be starting on the "massive marketing mailing" project. We want to ensure that they can view contact details of the rest of the marketing team, but they should not have access to view contact details of anyone else here at our company. Is this something that you can help with?

What are two of the steps you need to perform to fulfill this request?

Choose 2 answers

Options:

A.

Create an isolated OU for the consultants who need the restricted contacts access.

B.

Create a group that includes the contacts that the consultant is allowed to view.

C.

Apply the role of owner to the consultant in the group settings.

D.

Create the consultant inside under the marketing OU.

E.

Ensure that you are assigned the Administrator Privilege of Services > Services settings, and ensure that Services > Contacts > Contacts Settings Message is set.

Question 22

Your organization is in the process of deploying Google Drive for desktop so that your users can access Drive files directly from their desktops. For security reasons, you want to restrict Drive for desktop to only company-owned devices. What two steps should you take from the admin panel to restrict Drive for desktop to only company-owned devices?

Choose 2 answers

Options:

A.

Create a company-owned device inventory using an asset tag.

B.

Devices > Endpoints > Add a filter-> Management Type > Drive for desktop > Apply

C.

Apps > Google Workspace > Drive and Docs > Features and Applications > Google Drive for Desktop > Only Allow Google Drive for desktop on authorized devices

D.

Install the Google Endpoint Verification extension on machines using Drive for Desktop.

E.

Create a company-owned device inventory using serial numbers of devices.

Question 23

Your organization wants more visibility into actions taken by Google staff related to your data for audit and security reasons. They are specifically interested in understanding the actions performed by Google support staff with regard to the support cases you have opened with Google. What should you do to gain more visibility?

Options:

A.

From Google Admin Panel, go to Audit, and select Access Transparency Logs. Most Voted

B.

From Google Admin Panel, go to Audit, and select Login Audit Log.

C.

From Google Admin Panel, go to Audit, and select Rules Audit Log.

D.

From Google Admin Panel, go to Audit, and select Admin Audit Log.

Question 24

Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in Google Workspace Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error.

What should you do?

Options:

A.

Install Google Cloud Directory Sync on all Domain Controllers.

B.

Install Google Workspace Sync for Microsoft Outlook on all employees’ computers.

C.

Install Google Cloud Directory Sync on a supported server.

D.

Install Google Apps Manager to automate add-user scripts.

Question 25

With the help of a partner, you deployed Google Workspace last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things Google Workspace so that you can be prepared to take advantage of new features and ensure that your organization gets the most out of the platform.

What should you do?

Options:

A.

Develop a cadence of regular roadmap and business reviews with your partner.

B.

Regularly scan the admin console and keep track of any new features you identify.

C.

Create a Feature Release alert in the Alert Center to be alerted to new functionality.

D.

Put half of your organization on the Rapid Release Schedule to highlight differences.

Question 26

Your company moved to Google Workspace last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session.

How should you accomplish this?

Options:

A.

In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.

B.

Room participants will need to start the meeting from the remote in the room.

C.

By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.

D.

Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.

Question 27

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?

Options:

A.

Assign the ‘Services Admin’ role to an administrator with ‘Super Admin’ privileges.

B.

Create a ‘Custom Role’ and add all the Google Vault privileges for a new administrator.

C.

Validate that the new administrator has access to Google Vault.

D.

Create a ‘Custom Role’ and add the ability to manage Google Vault matters, holds, searches, and exports.

Question 28

In your organization, users have been provisioned with either Google Workspace Enterprise, Google Workspace Business, or no license, depending on their job duties, and the cost of user licenses is paid out of each division's budget. In order to effectively manage the license disposition, team leaders require the ability to look up the type of license that is currently assigned, along with the last logon date, for their direct reports.

You have been tasked with recommending a solution to the Director of IT, and have gathered the following requirements:

    Team leaders must be able to retrieve this data on their own (i.e., self-service).

    Team leaders are not permitted to have any level of administrative access to the Google Workspace Admin panel.

    Team leaders must only be able to look up data for their direct reports.

    The data must always be current to within 1 week.

    Costs must be mitigated.

What approach should you recommend?

Options:

A.

Export log data to BigQuery with custom scopes.

B.

Use a third-party tool.

C.

Use App Script and filter views within a Google Sheet.

D.

Create an app using AppMaker and App Script.

Question 29

The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's defense-in-depth strategy?

Options:

A.

Implement an IP block on the malicious user's IPs under Security Settings in the Admin Console.

B.

Use Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.

C.

Enforce higher complexity passwords by rolling it out to the affected users.

D.

Use Mobile device management geo-fencing to prevent malicious actors from using these stolen credentials.

Question 30

The application development team has come to you requesting that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app.

What should you do?

Options:

A.

Enable all API access for Google Drive.

B.

Enable “trust domain owned apps” setting.

C.

Add OAuth Client ID to Google Drive Trusted List.

D.

Whitelist the app in the Google Workspace Marketplace.

Question 31

A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?

Options:

A.

Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.

B.

Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.

C.

Immediately suspend the user's account, assign an archived user license, and export data.

D.

Suspend the user's account, search all associated users data in Google Vault, and export the data.

Question 32

Recently your organization has had an increase in messages marked as spam You need to quickly and efficiently obtain detailed information regarding each message What should you do?

Options:

A.

Create an investigation by using a SQL query to search for all spam audit logs exported to BigQuery

B.

Send an alert to all users to mark all suspicious Gmail messages as spam and review the Alert center messages

C.

Use Google Vault to put all messages marked as spam in a legal hold and review the messages

D.

Use the spam filter report in the security dashboard to see messages Google's spam filter marked as spam during a specific time period

Question 33

An employee at your company does not need access to their Workspace account while they are on leave for a year When they return you need to ensure they have access to their account and that all their data and current emails remain intact Also their shared documents must be available to other users You must accomplish this goal in the most cost-effective way What should you do?

Options:

A.

Assign an Archive User license

B.

Suspend their account in the Admin console

C.

Delete the user after copying their emails and reassigning their documents to their manager

D.

Remove the user license in the Admin console

Question 34

Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else.

What two things should you do? (Choose two.)

Options:

A.

Disable Guest Mode and Public Sessions.

B.

Enable a Device Policy of Sign In Screen and add the employee email address.

C.

Enroll a 2-Factor hardware key on the device using the employee email address.

D.

Enable a User Policy of Multiple Sign In Access and add just the employee email address.

E.

Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.

Question 35

User A is a Basic License holder. User B is a Business License holder. These two users, along with many additional users, are in the same organizational unit at the same company. When User A attempts to access Drive, they receive the following error: “We are sorry, but you do not have access to Google Docs Editors. Please contact your Organization Administrator for access.” User B is not presented with the same error and accesses the service without issues.

How do you provide access to Drive for User A?

Options:

A.

Select User A in the Directory, and under the Apps section, check whether Drive and Docs is disabled. If so, enable it in the User record.

B.

In Apps > Google Workspace > Drive and Docs, select the organizational unit the users are in and enable Drive for the organizational unit.

C.

In Apps > Google Workspace, determine the Group that has Drive and Docs enabled as a service. Add User A to this group.

D.

Select User A in the Directory, and under the Licenses section, change their license from Basic to Business to add the Drive and Docs service.

Question 36

As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager. As the Workspace Administrator, what should you do to preserve this user's Drive data?

Options:

A.

In the user deletion process, select “Transfer” in the data in other apps section and add the manager's email address.

B.

Use Google Vault to set a retention period on the OU where the users reside.

C.

Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.

D.

Ask the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.

Question 37

Several customers have reported receiving fake collection notices from your company. The emails were received from accounts.receivable@yourcompany.com, which is the valid address used by your accounting department for such matters, but the email audit log does not show the emails in question. You need to stop these emails from being sent.

What two actions should you take? (Choose two.)

Options:

A.

Change the password for suspected compromised account accounts.receivable@yourcompany.com.

B.

Configure a Sender Policy Framework (SPF) record for your domain.

C.

Configure Domain Keys Identified Mail (DKIM) to authenticate email.

D.

Disable mail delegation for the accounts.receivable@yourcompany.com account.

E.

Disable “Allow users to automatically forward incoming email to another address.”

Question 38

Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.

What should you do?

Options:

A.

Configure a Google Group as an email list.

B.

Delegate email access to department employees.

C.

Configure a Google Group as a collaborative inbox.

D.

Configure a Google Group, and set the Access Level to Announcement Only.

Question 39

Your organization is about to expand by acquiring two companies, both of which are using Google Workspace. The CISO has mandated that strict ‘No external content sharing’ policies must be in place and followed. How should you securely configure sharing policies to satisfy both the CISO’s mandate while allowing external sharing with the newly acquired companies?

Options:

A.

Allow external sharing of Drive content for the IT group only.

B.

Create a Drive DLP policy that will allow sharing to only domains on an allowlist.

C.

Use shared drives to store the content, and share only individual files externally.

D.

Let users share files between the two companies by using the ‘Trusted Domains’ feature. Create an allowlist of the trusted domains, and choose sharing settings for the users.

Question 40

Your organization is planning to remove any dependencies on Active Directory (AD) from all Cloud applications they are using You are currently using Google Cloud Directory Sync (GCDS) with on-premises AD as a source to provision user accounts in Google Workspace. Your organization is also using a software-as-a-service (SaaS) human resources information system (HRIS) that offers integration via CSV export and Open API standard.

Additional requirements for the solution include:

• It should not require a subscription to any additional third-party service.

• The process must be automated from beginning to end.

You are tasked with the design and implementation of a solution to address user provisioning with these requirements.

What solution should you implement?

Options:

A.

Set up Azure AD and federate on-premises AD with it. Provision user accounts from Azure AD with the Google-recommended process.

B.

Modify the GCDS configuration to use the HRIS application as the data source and complete any necessary adjustments

C.

Export HRIS data to a CSV file every day. and build a solution to define the delta with the previous day;

import the result as a CSV file via the Admin console.

D.

Build an application that will fetch updated data from the HRIS system via Open API. and then update

Google Workspace with the Directory API accordingly.

Question 41

Your organization is concerned with the increasing threat of phishing attacks that may impact users.

Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

Options:

A.

Enable Enforce Strong Password policy.

B.

Enable Employee ID Login Challenge.

C.

Decrease the Maximum User Session Length.

D.

Revoke token authorizations to external applications.

Question 42

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.

What should you do?

Options:

A.

Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.

B.

Change Enrollment Controls to Place Chrome device in user organization.

C.

Change Enrollment Controls to Keep Chrome device in current location.

D.

Change Enrolment Permissions to not allow users in this organization to enroll new devices.

Question 43

The security team for your organization is concerned about phishlng attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks?

Choose 2 answers

Options:

A.

Configure spoofing and authentication controls to quarantine messages that are perceived as threats

B.

Train end users to mark messages as spam when they see something suspicious.

C.

Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.

D.

Enforce confidents mode for all messages sent and received from your Workspace domain

E.

Force encryption on all inbound and outbound emails from your Workspace domain.

Question 44

Your IT team is being asked to fulfill a query by your organization's legal department that requires an MBOX file that will be shared to a third-party partner for eDiscovery. The query must be run on multiple users. Legal has no admin rights to Google Vault. What should you do to fulfil the request?

Options:

A.

Create a Google Vault matter for each user account, and share the matters to the legal admin.

B.

Create a Google Vault matter, search for data, and run an export for the legal department.

C.

Use the Investigation Too! to search for the data requested, and export for the legal department.

D.

Search for the data in Gmail, and export for the legal department.

Question 45

Your company frequently hires from five to ten interns for short contract engagements and makes use of the

same generically named Google Workspace accounts (e.g., user1@your-company.com, user2@your-company.com, user3@your-company.com). The manager of this program wants all email to these accounts routed to the manager's mailbox account also.

What should you do?

Options:

A.

Setup address forwarding in each account's GMail setting menu.

B.

Set up recipient address mapping in GMail Advanced Settings.

C.

Configure an Inbound Gateway route.

D.

Give the manager delegated access to the mailboxes.

Question 46

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.

What should you do?

Options:

A.

Run the Transfer Tool for Unmanaged users.

B.

Use a Google Form to survey the Marketing department users.

C.

Assure the VP that there is no action required to configure Google Workspace.

D.

Contact Google Enterprise Support to identify affected users.

Question 47

The compliance team at your organization is conducting a legal investigation into some concerning sales activities of an employee eight months ago The compliance team contacted you for assistance on the situation You set up the default Google Vault retention rules so all data is retained only for one year You must assist the compliance team with the investigation What should you do1?

Options:

A.

Do nothing The retention period has already ended and the evidence has already been purged

B.

Suspend the employee and export all data by using Google Takeout

C.

Assign the compliance team a Google Vault administrator role and create a legal hold for the employee

D.

D. Assign the compliance team a Google Vault administrator role and change the default retention rules to three years.

Question 48

Employees at your organization frequently and mistakenly delete important emails that they receive from your payroll department The employees have to file support tickets for the IT team to find and restore these emails You must provide an automated solution that minimizes IT overhead and prevents these emails from being permanently deleted from their inboxes What should you do?

Options:

A.

Create a content compliance rule that targets internal messages Use an advanced content match for the sender header to match the

payroll department's email Quarantine the message so that administrators can review the email before they release it to the user

B.

Create an Apps Script project that uses the Gmail API to find any recently deleted emails and automatically restore them to the inboxes Set

the script trigger to be time-driven and run every hour

C.

Create a content compliance rule that targets all internal messages that are sent from the payroll department Modify the message by

prepending a custom subject line to all payroll emails so that employees know not to delete them

D.

Create an activity rule by using Gmail log events with two conditions one for the event of an email deletion and another that matches the header address to the payroll department's email Create an action that restores messages Set the rule to run every hour

Question 49

Your global marketing team has over 500 employees. They recently started working with Google Analytics and want to move to managed accounts You decide to use Google Cloud Directory Sync (GCDS) to sync users from your current identity provider Your organization currently has no Google Workspace licenses linked to the Admin console You run GCDS for the first lime and receive the following error. "Domain user limit reached " You need to identify and fix the problem What should you do?

Options:

A.

Ensure that there is a subscription available and enough licenses to sync the new users

B.

Check if GCDS has the correct permissions to run a sync on your domain

C.

Wait 48 hours until the domain is fully provisioned

D.

Update the delete limits of GCDS and try again

Question 50

Your organization has hired a recruiting firm that is responsible for reviewing resumes and job descriptions of prospective summer interns. Employees at your organization need to collaborate with the external firm on these documents. You must set permissions and ensure the recruiting firm employees can't remove the files. What should you do?

Options:

A.

Create a Google Group, add the HR team, and create a shared folder for content storage and editing

B.

Enable client-side encryption for the organizational unit (OU) for which the HR team are members

C.

Create a Shared Drive and grant Content Manager access to the HR team

D.

Create a Shared Drive and grant Contributor access to the HR team

Question 51

An employee at your organization is resigning They are in charge of organizing and maintaining recurring team events You want to preserve the existing meetings and transfer ownership to the resigning employee's manager What should you do?

Options:

A.

Assign an Archived User (AU) license for the resigning employee

B.

Delete the existing calendar events and instruct the manager to create new events as the owner

C.

Instruct the resigning employee to share free busy details for their calendar with their manager

D.

Transfer both the events and the resources owned by the resigning employee to their manager by using the Admin console

Question 52

You are the administrator of a domain that requires iOS mobile device management. What initial steps should be taken to ensure that you can properly manage end-user iOS devices?

Options:

A.

Follow the prompts under "company owned devices," and select "iOS Management." Select the option to "enforce management on iOS devices."

B.

Configure an Apple Push Certificate, and select "certificate never expires."

C.

Configure an Apple Push Certificate, and be sure to use a work address that can be accessed in the future.

D.

In the Admin console, navigate to iOS management, and enable the Apple Push Certificate connector.

Question 53

On which two platforms can you push WiFi connection information with Google Workspace? (Choose two.)

Options:

A.

Mac OS

B.

Windows

C.

Chrome OS

D.

iOS

E.

Linux

Question 54

Your executive team has asked you to export all available data for 1,200 of your 1,500 Google Workspace Domain users. How should you proceed to export the data with the least amount of effort?

Options:

A.

Perform a search in Google Vault for the 500 users and export all of the results.

B.

Create a shared drive for the exports. Instruct end users to manually use Google Takeout to export the data and place the exported files in the shared drive.

C.

Contact Google Cloud support to perform the export for you.

D.

Contact Google Cloud Support to enable the Data Export tool for your organization, because you have more than 1,000 users, then use the tool to export data for the domain, and remove any unnecessary user data.

Question 55

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

Options:

A.

Remove Google Workspace license to prevent users from accessing their accounts now.

B.

Suspend users that the organization does not wish to have access.

C.

Add the users to the OU with all services disabled.

D.

Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Question 56

Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What steps should you take from the admin panel to preventusers from copying data from work to personal apps on iOS devices? (Choose Two)

Options:

A.

Clear the "allow users to copy data to personal apps" checkbox.

B.

Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Data Protection

C.

Turn on "Advanced Mobile Management."

D.

Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Open Docs in Unmanaged Apps

E.

Clear the "allow items created with managed apps to open in unmanaged apps" checkbox.

Question 57

Your organization implemented Single Sign-On (SSO) for the multiple cloud-based services it uses. During authentication, one service indicates that access to the SSO provider is not possible due to invalid information. What should you do?

Options:

A.

Update the validation certificate.

B.

Verify that the Audience element in the SAML Response matches the assertion consumer service (ACS) URL

C.

Run nslookup to confirm that the service exists.

D.

Ensure that Microsoft's Active Directory Federation Services 2.0 sends encrypted SAML Responses in default configurations.

Question 58

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

Options:

A.

Reinstall Password Sync on all domain controllers.

B.

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.

Confirm that the Password Sync service is running on all domain controllers.

D.

Reset the user's password in Active Directory.

Question 59

As a Workspace Administrator you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

Options:

A.

Download the company-owned inventory template CSV file from the Admin panel enter the serial number of the devices and upload the

B.

completed file to the company-owned inventory in the admin panel B O Download the company-owned inventory template CSV file from the Admin panel enter the device OSs. and serial numbers and upload the

C.

completed file to the company-owned inventory in the admin panel. C O Download the company-owned inventory template CSV file from the Admin panel enter the asset tags of the devices, and upload the

D.

completed file to the company-owned inventory in the admin panel D O Download the company-owned inventory template CSV file from the Admin panel, enter the device OSs. and asset tags, and upload the

Page: 1 / 20
Total 199 questions