Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Google Google-Workspace-Administrator Dumps

Associate Google Workspace Administrator Questions and Answers

Question 1

Your company provides shared Chromebook workstations for employees to access sensitive company data. You must configure the devices to ensure no sensitive data is stored locally and that browsing data is cleared after each use. What should you do?

Options:

A.

Force ephemeral mode in Chrome. Disable offline access for sensitive Workspace apps like Docs, Sheets, and Drive.

B.

Enable the Manage Guest Session functionality, and set the maximum user session length.

C.

Force ephemeral mode in Chrome. Allow offline access for all Workspace apps with strict expiration times.

D.

Disable offline access for all Workspace apps. Enable incognito mode for Chrome browsing sessions.

Question 2

You work for a healthcare provider that uses an external medical billing company to manage patient records and invoices. Your organization’s employees need to share patient documents with the billing company’s employees for processing. You need to configure access so the medical billing company’s employees can view and edit the documents, but they cannot delete the documents. What should you do?

Options:

A.

Create a shared drive that is managed by your organization's employees. Grant Contributor access to the billing company's staff.

B.

Create a shared drive. Grant Content Manager access to your organization's employees and the billing company.

C.

Create a group, and add the employees from your organization and the billing company. Create a shared folder on Google Drive. Grant Editor access to the group

D.

Restrict access for the medical billing company's employees by using Data Loss Prevention (DLP) policies.

Question 3

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Options:

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Question 4

Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?

Options:

A.

Configure the Drive sharing options for the domain to internal only.

B.

Restrict the Drive sharing options for the domain to allowlisted domains.

C.

Create a Drive DLP rule, and use the sensitive internal Project name as the detector.

D.

Turn off the Drive sharing setting from the Team dashboard.

Question 5

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Question 6

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company’s security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

Options:

A.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

B.

Assign the User Management Admin role to the security team.

C.

Assign the super admin role to the security team

D.

Create an administrator role with Security Center access. Assign the role to the security team.

Question 7

An employee at your organization may be sharing confidential documents with unauthorized external parties. You must quickly determine if any sensitive information has been leaked. What should you do?

Options:

A.

Review the employee's Drive log events in the security investigation tool.

B.

Audit Drive access by using the Admin SDK Reports API.

C.

Review the employee's user log events within the security investigation tool.

D.

Create a custom report of the user's external sharing by using the security dashboard.

Question 8

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Options:

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Question 9

You are applying device and user policies for employees in your organization who are in different departments. You need each department to have a different set of policies. You want to follow Google-recommended practices. What should you do?

Options:

A.

Create separate top-level organizational units for each department.

B.

Create an Access group for each department. Configure the applicable policies.

C.

Add all managed users and devices in the top-level organizational unit.

D.

Create a child organizational unit for each department.

Question 10

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Question 11

Your company has offices in several different countries and is deploying Google Workspace. You're setting up Google Calendar and need to ensure that, when a user is creating a Google Calendar event, rooms are suggested in a nearby office. What should you do?

Options:

A.

Assign building ID, floor name, and floor section to define users' work locations based on defined buildings and rooms.

B.

Add your users to Google Groups by location. Add room resources to the corresponding groups.

C.

Add your users to organizational units (OUs) by location. Add room resources to the corresponding OUs.

D.

Restrict room sharing to a dynamic group based on user location.

Question 12

A department at your company wants access to the latest AI-powered features in Google Workspace. You know that Gemini offers advanced capabilities and you need to provide the department with immediate access to Gemini’s features while retaining control over its deployment to ensure that corporate data is not available for human review. What should you do?

Options:

A.

Enable Gemini for the department’s organizational unit and assign Gemini licenses to users in the department.

B.

Monitor Gemini adoption through the administrator console and wait for wider user adoption before assigning licenses.

C.

Enable Gemini for non-licensed users in that department so they have immediate access to the free service.

D.

Enable Alpha features for the organization and assign Gemini licenses to all users.  

Question 13

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee’s documents for the manager and the team.

You want to minimize license cost. What should you do?

Options:

A.

Delete the former employee's Workspace account.

B.

Suspend former employee's Workspace account.

C.

Reset the password of the former employee and keep their Workspace license active.

D.

Switch the license type of the former employee's Workspace account to an Archived User license.

Question 14

Your organization is increasingly concerned about its environmental impact. You want to assess the environmental impact of using Google Workspace services. Which report should you use?

Options:

A.

Carbon footprint report

B.

Google Environmental Report

C.

Apps Monthly Uptime report

D.

Accounts report

Question 15

Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentiallyleading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?

Options:

A.

Add a banner to the newsletter that warns users that external sharing is prohibited.

B.

Create a Gmail content compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected

C.

Develop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.

D.

Create a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.

Question 16

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Options:

A.

Redirect the acquired domain to Google’s MX records and add the account as a “send as” address.

B.

Set up the acquired agency as a secondary domain from the Manage domains page.

C.

Set up the acquired agency as a user alias domain from the Manage domains page.

D.

Set up the acquired agency as a secondary domain and swap it to the primary domain.

Question 17

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

Options:

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Question 18

Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.

You need to enforce the new password policy in Google Workspace. What should you do?

Options:

A.

Share the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.

B.

Enable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.

C.

Create a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.

D.

Create a password policy in Active Directory. Enable password synchronization in GCDS.

Question 19

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

Options:

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Question 20

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

Options:

A.

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.

B.

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.

C.

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.

D.

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.

Question 21

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?

Options:

A.

Create and enforce a new password policy for all users in your organization.

B.

Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.

C.

Create an activity rule that is triggered by the User’s password changed event. Add compliance team members as email recipients.

D.

Create a new alert by using user log events. Check that the challenge type is “Password”, and add the compliance team as email recipients.

Question 22

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

Options:

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Question 23

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

Options:

A.

Adjust the organization’s mail content compliance settings in the Admin console.

B.

Advise users to individually allowlist senders.

C.

Disable spam filtering for all users.

D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Question 24

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Question 25

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external GoogleGroups with their Google Workspace accounts without interrupting internal group usage. What should you do?

Options:

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.

B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.

C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.

D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.

Question 26

You are configuring email for your company’s Google Workspace account. The company wants to prevent certain types of files from being sent or received as email attachments in the simplest and most cost-effective way. What should you do?

Options:

A.

Adjust the maximum message size limit to prevent large files from being sent or received.

B.

Enable the Security Sandbox in Gmail to automatically quarantine emails with suspicious attachments.

C.

Scan all incoming and outgoing emails for malicious attachments by using an industry standard third-party email security solution.

D.

Configure an attachment compliance rule in Gmail settings to block specific file types.

Question 27

Your company has purchased Gemini licenses for a subset of employees. You need to ensure that only users in the marketing and sales departments have access to Gemini features by using the most efficient approach. What should you do?

Options:

A.

Create a script to assign a Gemini license to new users if they are in marketing or sales. Run the script daily.

B.

Create an organizational unit (OU) for marketing and sales. Assign the Gemini licenses to that OU, and enable Gemini for that OU only.

C.

Assign Gemini licenses to each user in the marketing and sales departments.

D.

Enable Gemini for the entire organization. Instruct users in other departments not to use Gemini.

Question 28

Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?

Options:

A.

Run the Transfer tool to bring unmanaged users to your Workspace account.

B.

Check domain ownership in the DNS settings.

C.

Wait 24 hours after signing up for the features to become active.

D.

Upgrade to a Google Workspace Enterprise edition.

Question 29

An end user has thousands of files stored in Google Drive. Their files are well organized with Drive labels. You need to advise the end user on how to quickly identify all files that are contracts. What should you do?

Options:

A.

Advise the user to use the Google Drive API to search for files with the keyword "contracts'

B.

Advise the user to search in Drive for files with the keyword "contracts', and use the "modified by me' filter.

C.

Advise the user to search for files that are labeled as "contracts'.

D.

Advise the user to use the Investigation tool to search for files with the keyword "contracts' and updated by you.

Question 30

Your organization is about to conduct its biannual risk assessment. You need to help identify security risks by quickly reviewing all security settings for Gmail, Drive, and Calendar. What should you do?

Options:

A.

In the reporting section of the Admin console, review the Gmail, Drive, and Calendar reports.

B.

In the alert center, review all of the alerts.

C.

In each individual organizational unit (OU), review the security settings.

D.

In the Google Admin console, review the security health page.

Question 31

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Question 32

A user is experiencing intermittent issues accessing their Gmail inbox. Sometimes their Gmail loads slowly, and other times the user encounters error messages that haven’t been documented. You need to effectively troubleshoot this recurring problem. What should you do?

Options:

A.

Check the Google Workspace Status Dashboard for any reported service disruptions.

B.

Instruct the user to generate a HAR file the next time they experience slowness or an error.

C.

Instruct the user to try to access Gmail from another device or network to see if the issue persists.

D.

Instruct the user to clear their browser cache and cookies.

Question 33

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

Options:

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Question 34

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Question 35

You are configuring data governance policies for your organization's Google Drive. You need to ensure that employees in the Research and Development department can share files with external users, while employees in the Finance department are blocked from sharing any files externally. What should you do?

Options:

A.

Create a Drive trust rule that allows external sharing for the Research and Development organizational unit (OU) and another rule that blocks external sharing for the Finance OU.

B.

Enable Vault for the Finance organizational unit (OU) to ensure that all files shared externally are retained and auditable.

C.

Apply an organization-wide data loss prevention (DLP) rule that scans for sensitive information and prevents external sharing of those files. Apply that rule to the Finance organizational unit (OU).

D.

Create a separate Google Workspace domain for the Finance organizational unit (OU) and disable external sharing for that domain.

Question 36

The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?

Options:

A.

Instruct the IT department to directly access and forward the relevant emails to the legal department.

B.

Temporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.

C.

Ask a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.

D.

Use Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.

Question 37

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

Options:

A.

Adjust the organization’s mail content compliance settings in the Admin console.

B.

Advise users to individually allowlist senders.

C.

Disable spam filtering for all users.

D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Question 38

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

Options:

A.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

B.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

C.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

D.

Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Question 39

An employee with a Workspace Business Plus license at your company is going on a long leave soon. The employee will not need access to their Google Workspace data, but their teammates will need access to the employee’s data. When the employee returns from leave, you will need to restore access to theiraccount, data, emails, and shared documents. You need to preserve the employee’s Workspace data while also minimizing cost while they are on leave. What should you do?

Options:

A.

Suspend their account in the Admin console.

B.

Purchase an Archived User license and assign the license to the employee.

C.

Export the account data by using Takeout, and remove the user license in the Admin console.

D.

Copy the employee’s emails, and transfer their file ownership to a teammate. Delete the user account.

Question 40

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Options:

A.

Redirect the acquired domain to Google’s MX records and add the account as a “send as” address.

B.

Set up the acquired agency as a secondary domain from the Manage domains page.

C.

Set up the acquired agency as a user alias domain from the Manage domains page.

D.

Set up the acquired agency as a secondary domain and swap it to the primary domain.

Question 41

You are onboarding a new employee who will use a company-provided Android device. Your company requires the ability to enforce strong security policies on mobile devices, including password complexity requirements and remote device wipe capabilities. You need to choose the appropriate Google Workspace mobile device management solution. What should you do?

Options:

A.

Use a third-party mobile device management (MDM) solution to manage the device.

B.

Allow the employee to use their personal device without enrolling it in any mobile device management (MDM) solution.

C.

Implement Google’s basic management solution for the mobile device.

D.

Implement Google’s advanced management solution for the mobile device.

Question 42

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

Options:

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

Question 43

Your company’s help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?

Options:

A.

Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.

B.

Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).

C.

Turn off more aggressive spam filtering in spam policies that are applied to the users’ organizational unit and add the senders’ mail system IP addresses to the email allowlist.

D.

Create an address list of approved senders so messages from these users bypass Gmail’s spam filters and recipients can decide whether they are spam or not.

Question 44

Your company has recently purchased a new domain name to use for the corporate email addresses. However, you are unable to access certain features in Google Workspace because the domain is not verified. You need to verify the domain. What should you do?

Options:

A.

Contact Google support and request manual verification.

B.

Add an MX record to your DNS zone that points to Google Workspace.

C.

Request a TXT record be added to the DNS zone by your domain registrar.

D.

Purchase a SSL certificate for your domain.

Question 45

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Question 46

Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?

Options:

A.

Create a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.

B.

Create a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.

C.

Create a Google Group and update the settings to allow anyone in the organization to join the group.

D.

Create a Google Group and appoint a group admin to manage the membership of this group.

Page: 1 / 9
Total 90 questions