Pre-Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Google > Workspace Administrator > Google-Workspace-Administrator

Google-Workspace-Administrator Associate Google Workspace Administrator Question and Answers

Question # 4

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Full Access
Question # 5

The current data storage limit for the sales organizational unit (OU) at your company is set at 10GB per user. A subset of sales representatives in that OU need 100GB of storage across shared services. You need to increase the storage for only the subset of sales representatives by using the least disruptive approach and the fewest configuration steps. What should you do?

A.

Move the subset of users to a sub-OU, and assign a 100GB storage limit to that sub-OU.

B.

Instruct the subset of users to store their documents in a Shared Drive with a 100GB limit.

C.

Change the storage limit of the sales OU to 100GB.

D.

Create a configuration group, and add the subset of users to that group. Set the group storage limit to 100GB.

Full Access
Question # 6

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.

What should you do?

A.

Export the resource list to a CSV file, make the changes, and re-import the updated file.

B.

Edit each resource in the Google Admin console.

C.

Add the modified rooms as new resources. Tell employees not to use old rooms.

D.

Delete the existing resources and recreate the resources with the updated information.

Full Access
Question # 7

You are onboarding a new employee who will use a company-provided Android device. Your company requires the ability to enforce strong security policies on mobile devices, including password complexity requirements and remote device wipe capabilities. You need to choose the appropriate Google Workspace mobile device management solution. What should you do?

A.

Use a third-party mobile device management (MDM) solution to manage the device.

B.

Allow the employee to use their personal device without enrolling it in any mobile device management (MDM) solution.

C.

Implement Google’s basic management solution for the mobile device.

D.

Implement Google’s advanced management solution for the mobile device.

Full Access
Question # 8

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Full Access
Question # 9

Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?

A.

Run the Transfer tool to bring unmanaged users to your Workspace account.

B.

Check domain ownership in the DNS settings.

C.

Wait 24 hours after signing up for the features to become active.

D.

Upgrade to a Google Workspace Enterprise edition.

Full Access
Question # 10

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

A.

Redirect the acquired domain to Google’s MX records and add the account as a “send as” address.

B.

Set up the acquired agency as a secondary domain from the Manage domains page.

C.

Set up the acquired agency as a user alias domain from the Manage domains page.

D.

Set up the acquired agency as a secondary domain and swap it to the primary domain.

Full Access
Question # 11

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

A.

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.

Enable Protect against unauthenticated emails in Gmail Safety.

D.

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Full Access
Question # 12

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

A.

Conduct a Vault search to find this email and identify if additional users were affected.

B.

Conduct a search to find all emails sent by the sender by usingthe Gmail API.

C.

Conduct an Email reports search to find this email and all of the email's recipients.

D.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Full Access
Question # 13

Your company operates several primary care clinics where employees routinely work with protected health information (PHI). You are in the process of transitioning the organization to Google Workspace from a legacy communication and collaboration system. After you sign the Business Associate Agreement (BAA), you need to ensure that data is handled in compliance with regulations when using Google Workspace. What should you do?

A.

Implement a third-party backup service that is also compliant with Google Workspace core services.

B.

Create a label for Google Drive content to help employees identify sensitive data.

C.

Instruct the staff to not store any PHI in Google Workspace core services, including Google Drive. Docs. Sheets, and Keep.

D.

Disable integrations with third-party apps and turn off non-core Google services.

Full Access
Question # 14

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Full Access
Question # 15

Your organization handles a significant amount of sensitive customer data and must follow strict industry regulations. To meet an upcoming compliance deadline, you need to quickly implement a solution that automatically classifies files stored in Google Drive based on the content of files.

What should you do?

A.

Create data loss prevention (DLP) rules for Drive. Configure the rules to apply Drive labels based on content.

B.

Apply Drive labels based on content. Use Google Vault to create retention rules based on Drive labels, ensuring that data is kept for the required duration.

C.

Implement a third-party data governance tool that integrates with Drive and provides advanced classification capabilities.

D.

Add users into organizational units (OUs). Configure default file classification in Drive for the desired OUs.

Full Access
Question # 16

Your company is undergoing a regulatory compliance audit. As part of the audit, you are required to demonstrate that you can preserve all electronic communications related to a specific project for a potential legal discovery process. You need to configure Google Vault to accomplish this goal. What should you do?

A.

Use the security investigation report to show Vault log events.

B.

Use the search and export functionality to identify all relevant communications within the project timeframe.

C.

Create a matter and a hold on all project-related data sources such as Email. Chat, and Drive within Google Workspace.

D.

Create a custom retention policy for the project data. Ensure that the policy covers the required retention period.

Full Access
Question # 17

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

A.

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.

B.

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.

C.

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.

D.

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.

Full Access
Question # 18

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Full Access
Question # 19

During a recent Google Meet video conference, several employees reported that they could not hear the presenters. The presenters confirmed that their laptops’ microphones were working. The affected employees were all using company-issued laptops. You need to quickly diagnose the source of the issue. What should you do first?

A.

Verify that the audio drivers on the affected laptops are up-to-date and functioning correctly.

B.

Check the Admin console to determine whether there are recent Meet-related notifications or alerts.

C.

Check if Context-Aware access rules were set to prevent Meet access from the user’s network location.

D.

Use the Meet quality tool for each affected user to analyze their microphone settings and configurations during the meeting.

Full Access
Question # 20

Your company wants to enable single sign-on (SSO) for its employees to access a newly acquired cloud-based marketing platform. The marketing platform vendor has confirmed SAML 2.0 compatibility and provided the necessary metadata. You need to streamline user access and centralize authentication through Google Workspace. What should you do?

A.

Request an API key from the marketing platform vendor for SAML integration.

B.

Enable two-factor authentication for all users to enhance security before implementing SSO.

C.

Instruct employees to log in to the marketing platform using the Sign In with Google functionality.

D.

Create a new SAML application in the Google Admin console.

Full Access
Question # 21

Your organization allows employees to use their personal devices for work purposes. You want to ensure these devices follow the company’s security policies. You need to choose a mobile management solution that provides minimal passcode enforcement and allows for an admin to remotely wipe a user’s account from the device. You also want to avoid having to install agents on employees’ personal devices. What should you do?

A.

Implement Google’s advanced management on mobile devices.

B.

Implement Google’s basic management on mobile devices.

C.

Enforce a strong password policy, and enforce the password policy at the next sign-in.

D.

Deploy a third-party mobile device management (MDM) solution.

Full Access