Special Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Google Google-Workspace-Administrator Dumps

Associate Google Workspace Administrator Questions and Answers

Question 1

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

Options:

A.

Conduct a Vault search to find this email and identify if additional users were affected.

B.

Conduct a search to find all emails sent by the sender by usingthe Gmail API.

C.

Conduct an Email reports search to find this email and all of the email's recipients.

D.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Question 2

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Question 3

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

Options:

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Question 4

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Options:

A.

Redirect the acquired domain to Google’s MX records and add the account as a “send as” address.

B.

Set up the acquired agency as a secondary domain from the Manage domains page.

C.

Set up the acquired agency as a user alias domain from the Manage domains page.

D.

Set up the acquired agency as a secondary domain and swap it to the primary domain.

Question 5

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Question 6

You are onboarding a new employee who will use a company-provided Android device. Your company requires the ability to enforce strong security policies on mobile devices, including password complexity requirements and remote device wipe capabilities. You need to choose the appropriate Google Workspace mobile device management solution. What should you do?

Options:

A.

Use a third-party mobile device management (MDM) solution to manage the device.

B.

Allow the employee to use their personal device without enrolling it in any mobile device management (MDM) solution.

C.

Implement Google’s basic management solution for the mobile device.

D.

Implement Google’s advanced management solution for the mobile device.

Question 7

Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?

Options:

A.

Create a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.

B.

Create a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.

C.

Create a Google Group and update the settings to allow anyone in the organization to join the group.

D.

Create a Google Group and appoint a group admin to manage the membership of this group.

Question 8

Your organization handles a significant amount of sensitive customer data and must follow strict industry regulations. To meet an upcoming compliance deadline, you need to quickly implement a solution that automatically classifies files stored in Google Drive based on the content of files.

What should you do?

Options:

A.

Create data loss prevention (DLP) rules for Drive. Configure the rules to apply Drive labels based on content.

B.

Apply Drive labels based on content. Use Google Vault to create retention rules based on Drive labels, ensuring that data is kept for the required duration.

C.

Implement a third-party data governance tool that integrates with Drive and provides advanced classification capabilities.

D.

Add users into organizational units (OUs). Configure default file classification in Drive for the desired OUs.

Question 9

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Question 10

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Question 11

Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?

Options:

A.

End all unsupervised meetings by using the Google Meet APIs.

B.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.

C.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.

D.

Identify and end all unsupervised meetings by using the security investigation tool.

Question 12

You work for a healthcare provider that uses an external medical billing company to manage patient records and invoices. Your organization’s employees need to share patient documents with the billing company’s employees for processing. You need to configure access so the medical billing company’s employees can view and edit the documents, but they cannot delete the documents. What should you do?

Options:

A.

Create a shared drive that is managed by your organization's employees. Grant Contributor access to the billing company's staff.

B.

Create a shared drive. Grant Content Manager access to your organization's employees and the billing company.

C.

Create a group, and add the employees from your organization and the billing company. Create a shared folder on Google Drive. Grant Editor access to the group

D.

Restrict access for the medical billing company's employees by using Data Loss Prevention (DLP) policies.

Question 13

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

Options:

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Question 14

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company’s security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

Options:

A.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

B.

Assign the User Management Admin role to the security team.

C.

Assign the super admin role to the security team

D.

Create an administrator role with Security Center access. Assign the role to the security team.

Question 15

The innovation team at your organization has a dedicated room with prototype equipment. You need to make the room bookable, add the equipment, and ensure that there are no booking conflicts. Only the innovation team and the sales directors can access this room. What should you do?

Options:

A.

Create a separate Google Calendar resource for the room. Manually manage booking requests from both teams.

B.

Create a Google Group for the innovation team and another Google Group for sales directors. Share the room's calendar with both groups.

C.

Create a Google Calendar event for the room. Share the event with the innovation team and sales directors.

D.

Edit the Google Calendar settings for the room resource. Adjust the permission settings so only the innovation team and sales director group can view and book time on this calendar.

Question 16

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

Options:

A.

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.

Upload the HAR file to Google Drive and share the file with the Google support representative.

Question 17

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

Options:

A.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

B.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

C.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

D.

Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Question 18

Your organization’s security team has published a list of vetted third-party apps and extensions that can be used by employees. All other apps are prohibited unless a business case is presented and approved. The Chrome Web Store policy applied at the top-level organization allows all apps and extensions with an admin blocklist. You need to disable any unapproved apps that have already been installed and prevent employees from installing unapproved apps. What should you do?

Options:

A.

Change the Chrome Web Store allow/block mode setting to allow all apps, admin manages blocklist, In the App access control card, block any existing web app that is not on the security team’s vetted list.

B.

Change the Chrome Web Store allow/block mode setting to block all apps, admin manages allowlist. Add the apps on the security team’s vetted list to the allowlist.

C.

Disable Extensions and Chrome packaged apps as Allowed types of apps and extensions for the top-level organizational unit. Selectively enable the appropriate extension types for each suborganization

D.

Disable the Chrome Web Store service for the top-level organizational unit. Enable the Chrome Web Store service for organizations that require Chrome apps and extensions.

Question 19

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

Options:

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Question 20

A new user at your organization is unable to access Google Meet. You have verified that the user’s account is active and the correct licenses are assigned. You need to resolve the access issue. What should you do?

Options:

A.

Check the user’s browser settings to ensure that Meet is not blocked.

B.

Instruct the user to clear their browser’s cache and cookies.

C.

Restart the user’s computer to refresh their network connection.

D.

Verify that Meet is enabled as a service for the user’s account in the Admin console.

Question 21

You need to ensure that data owned by former employees remains available in Google Vault. You want to use the most cost-effective solution.

What should you do?

Options:

A.

Migrate the former employees’ Gmail to their manager(s) by using the data migration service during the deletion process. Transfer the former employees’ Google Drive files to a new owner.

B.

Change the Google account passwords of the former employees.

C.

Suspend the former employees’ Google accounts. Create an organizational unit (OU). Move the former employees into that OU.

D.

Assign an Archived User license to the former employees’ Google accounts.

Page: 1 / 7
Total 73 questions