New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Google > Workspace Administrator > Google-Workspace-Administrator

Google-Workspace-Administrator Google Cloud Certified - Professional Google Workspace Administrator Question and Answers

Question # 4

Your organization deployed Google Workspace Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your Google Workspace organization.

What should you do?

A.

Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.

B.

Use Work Insights to gather adoption metrics and target your training exercises.

C.

Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.

D.

Use a script to monitor Email attachment types and target users that aren't using Drive sharing.

Full Access
Question # 5

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?

A.

Assign the pre-built security admin role to the security team members.

B.

Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.

C.

Assign the Super Admin Role to the security team members.

D.

Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.

Full Access
Question # 6

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

A.

Remove Google Workspace license to prevent users from accessing their accounts now.

B.

Suspend users that the organization does not wish to have access.

C.

Add the users to the OU with all services disabled.

D.

Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Full Access
Question # 7

Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

A.

Use the login audit report to export all suspicious login details for analysis.

B.

Create a custom dashboard with the security investigation tool showing suspicious logins.

C.

Use the account activity report to export all suspicious login details for analysis.

D.

Create a custom query in BigQuery showing all suspicious login details.

Full Access
Question # 8

You have configured your Google Workspace account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new

features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization.

What should you do?

A.

Create a new OU and tum on the rapid release track just for this OU.

B.

Create a new Google Group with test users and enable the rapid release track.

C.

Establish a separate Dev environment, and set it to rapid release.

D.

Ask Google for a demo account with beta access to the new features.

Full Access
Question # 9

A user does not follow their usual sign-in pattern and signs in from an unusual location.

What type of alert is triggered by this event?

A.

Suspicious mobile activity alert.

B.

Suspicious login activity alert.

C.

Leaked password alert.

D.

User sign-in alert.

Full Access
Question # 10

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

A.

Reinstall Password Sync on all domain controllers.

B.

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.

Confirm that the Password Sync service is running on all domain controllers.

D.

Reset the user's password in Active Directory.

Full Access
Question # 11

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.

What should you do?

A.

Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.

B.

Change Enrollment Controls to Place Chrome device in user organization.

C.

Change Enrollment Controls to Keep Chrome device in current location.

D.

Change Enrolment Permissions to not allow users in this organization to enroll new devices.

Full Access
Question # 12

The helpdesk at your organization reports that many users in multiple locations are not able to access Gmail, but can access other Workspace services. You must troubleshoot the issue What should you do first?

A.

Open a ticket with Google Support listing the affected users.

B.

Check the Google Workspace status dashboard to see whether there is a disruption in Gmail service availability

C.

Check the Google Workspace release calendar to ensure there’s not a Gmail upgrade scheduled

D.

Check network connectivity of the affected users

Full Access
Question # 13

The application development team has come to you requesting that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app.

What should you do?

A.

Enable all API access for Google Drive.

B.

Enable “trust domain owned apps” setting.

C.

Add OAuth Client ID to Google Drive Trusted List.

D.

Whitelist the app in the Google Workspace Marketplace.

Full Access
Question # 14

Your organization is expected to start using Google Workspace Enterprise Standard in several countries. During the planning phase, the change management leadership team mandates that meeting rooms near each participant’s office location should be suggested when someone creates a Google Calendar event, to simplify the user experience and avoid booking rooms when people would not be able to move easily. What should you do?

A.

Organize users for each location in separate organizational units (OUs). Add room resources to the corresponding OUs so that meeting rooms would be suggested accordingly.

B.

Organize users for each location in separate Google Groups. Add room resources to the corresponding groups so that meeting rooms would be suggested accordingly.

C.

Share each room only with the Dynamic Group defined per each user location so that they can only book the rooms nearby.

D.

Define users' work locations by setting building ID. floor name, and floor section if applicable as the-buildings and rooms are defined.

Full Access
Question # 15

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?

A.

Assign the ‘Services Admin’ role to an administrator with ‘Super Admin’ privileges.

B.

Create a ‘Custom Role’ and add all the Google Vault privileges for a new administrator.

C.

Validate that the new administrator has access to Google Vault.

D.

Create a ‘Custom Role’ and add the ability to manage Google Vault matters, holds, searches, and exports.

Full Access
Question # 16

Your organization is concerned with the increasing threat of phishing attacks that may impact users.

Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

A.

Enable Enforce Strong Password policy.

B.

Enable Employee ID Login Challenge.

C.

Decrease the Maximum User Session Length.

D.

Revoke token authorizations to external applications.

Full Access
Question # 17

Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales

& Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access immediately if all of the following conditions are met:

    Access to the app is restricted to specific individuals by request only.

    The app does not have the ability to read or manage emails.

    Immediate notice is given to the Infosec team, followed by the submission of a security risk analysis report within 14 days.

Which actions should you take first to ensure that you are compliant with Infosec policy?

A.

Move the Senior VP to a sub-OU before enabling Marketplace Settings > “Allow Users to Install Any App from Google Workspace Marketplace.”

B.

Confirm that the Senior VP’s OU has the following Gmail setting disabled before whitelisting the app: “Let users delegate access to their mailbox.”

C.

Add the Marketplace app, then review the authorized scopes in Security > Manage API client access.

D.

Search the Google Workspace support forum for feedback about the app to include in the risk analysis report.

Full Access
Question # 18

As a Workspace Administrator you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

A.

Download the company-owned inventory template CSV file from the Admin panel enter the serial number of the devices and upload the

B.

completed file to the company-owned inventory in the admin panel B O Download the company-owned inventory template CSV file from the Admin panel enter the device OSs. and serial numbers and upload the

C.

completed file to the company-owned inventory in the admin panel. C O Download the company-owned inventory template CSV file from the Admin panel enter the asset tags of the devices, and upload the

D.

completed file to the company-owned inventory in the admin panel D O Download the company-owned inventory template CSV file from the Admin panel, enter the device OSs. and asset tags, and upload the

Full Access
Question # 19

You work at a large global holding firm with multiple companies that are united under one Google Workspace deployment. You must ensure that employees can only access documents at the company in which they are employed What should you do?

A.

Create a User group for each company and change Google Drive sharing settings to block external sharing

B.

Create an organizational unit (OU) for each company and disable file sharing.

C.

Set up data loss prevention (DLP) rules to prevent specific documents from being shared

D.

Set up Google Drive trust rules to prevent access to documents from individual companies

Full Access
Question # 20

Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?

A.

Create a configuration group with the approved users as members, and use it to create a target audience.

B.

Enable external sharing for the marketing and sales organizational units.

C.

Enable external sharing only to allowlisted domains provided by marketing and sales teams.

D.

Create a configuration group with the approved users as members, and enable external sharing for this group.

Full Access
Question # 21

A user named Alice is leaving your organization You need to transfer all of Alice's data from her Drive to Bob's Drive in the most simple and efficient manner possible What should you do?

A.

Use the Google Admin console to move the files from Alice's Drive to Bob's Drive

B.

Use the Google Takeout service to export Alice's data to a zip file and instruct Bob to import the zip file into his Drive

C.

Use the Google Drive API to programmatically transfer the files from Alice's Drive to Bob's Drive

D.

Instruct Alice to download all of her files from her Drive and upload them to Bob's Drive

Full Access
Question # 22

Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.

While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems. What advice would you give the development team in order to avoid the issue?

A.

Use the domain-wide delegation API to avoid the limitation per account.

B.

Use an exponential back-off algorithm to retry failed requests.

C.

Switch from REST API to gRPC protocol for performance improvement

D.

Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.

Full Access
Question # 23

Your organization is working on a confidential project with details that cannot be shared through email with anyone outside your organization You want to add controls in Gmail that prevent any mention of the project from being sent by employees Only the CEO and the CFO can send information about the project over email and without a delay What should you do?

A.

Configure the Gmail Restrict delivery setting and add an allowlist with all domains that your employees are allowed to send emails to Include the CEO and CFO email addresses to the allowlist

B.

Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project Bypass the rule by using the address list with the CEO and CFO email addresses.

C.

Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project Manually review all quarantined emails and choose to deliver the ones sent by the CEO and CFO

D.

Configure the Gmail Restrict delivery setting for all outgoing messages, except the internal emails Add the CEO and CFO email

Full Access
Question # 24

An employee at your organization is having trouble playing a video stored in Google Drive that is embedded in their Google Slides presentation You need to collect the necessary details to troubleshoot the issue What should you do?

A.

Confirm that the source video is in a supported format and resolution and that the user has permission to play the video Have a screen share session to confirm the behavior

B.

Instruct the employee to give you edit access to the presentation to review the revision history See if the error message changes when you delete and add the slides back

C.

Check the Google Drive audit logs for any error entries on the Slides presentation Check the help center for the appropriate error message

D.

Create a copy of the presentation to see if you can replicate the problem, and document any errors you see

Full Access
Question # 25

Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.

What are two ways you should accomplish this? (Choose two.)

A.

Use the Data Export Tool to export admin audit data to your existing SIEM system

B.

Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.

C.

Use Apps Script and the Reports API to export drive audit data to the existing SIEM system

D.

Use the BigQuery export to send admin audit data to the existing SIEM system via custom code

E.

Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.

Full Access
Question # 26

Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as “view data for all teams” to the HR group, but it is reporting an error when accessing the application. What should you do?

A.

Allocate the “view data for all teams” permission to all employees of the company.

B.

Confirm that the Work Insights app is turned ON for all employees.

C.

Confirm in Security > API controls > App Access Controls that Work Insights API is set to “unrestricted.”

D.

Confirm in Reports > BigQuery Export that the job is enabled.

Full Access
Question # 27

On which two platforms can you push WiFi connection information with Google Workspace? (Choose two.)

A.

Mac OS

B.

Windows

C.

Chrome OS

D.

iOS

E.

Linux

Full Access
Question # 28

Recently your organization has had an increase in messages marked as spam You need to quickly and efficiently obtain detailed information regarding each message What should you do?

A.

Create an investigation by using a SQL query to search for all spam audit logs exported to BigQuery

B.

Send an alert to all users to mark all suspicious Gmail messages as spam and review the Alert center messages

C.

Use Google Vault to put all messages marked as spam in a legal hold and review the messages

D.

Use the spam filter report in the security dashboard to see messages Google's spam filter marked as spam during a specific time period

Full Access
Question # 29

What action should be taken to configure alerting related to phishing attacks?

A.

Set up a Token audit log event alert.

B.

Set up an Admin audit log event alert.

C.

Set up an email settings changed alert.

D.

Set up a suspicious login event alert.

Full Access
Question # 30

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?

A.

Automatic Room Replacement does not work on recurring events.

B.

This feature requires calendar event owners to have the Buildings and resources administrator privilege

C.

The calendar resources do not have the Resource Category configured as CONFERENCE_ROOM

D.

The events have more than 20 attendees.

Full Access
Question # 31

You work for an organization that is headquartered in Washington DC You want to reliably send email announcements to all employees in the area and update membership automatically What should you do?

A.

Create a Dynamic Group by using the location condition to keep the distribution list automatically updated based on the employees work locations

B.

Create a Security Group and apply the Location label to allow employees to join based on the specified location

C.

Create a Google Group and add all employees in the Washington DC work location

D.

Create a Google Group and set permissions to invite employees to join the group

Full Access
Question # 32

You have enrolled a new Google Meet hardware device for an existing conference room in your building Your users report that the new hardware in the conference does not show the expected calendar events You need to investigate and fix the problem What should you do?

A.

Make sure that the conference room resource calendar has been created and that the Meet Hardware is associated with that resource

B.

Create a brand new resource calendar and associate the Meet Hardware with that new resource

C.

Use the Meet Quality Tool in the control panel to search for the newly installed Meet Hardware

D.

Make sure the Access permissions for the resource calendar is set to "See all event details

Full Access
Question # 33

Your organization implemented Single Sign-On (SSO) for the multiple cloud-based services it uses. During authentication, one service indicates that access to the SSO provider is not possible due to invalid information. What should you do?

A.

Update the validation certificate.

B.

Verify that the Audience element in the SAML Response matches the assertion consumer service (ACS) URL

C.

Run nslookup to confirm that the service exists.

D.

Ensure that Microsoft's Active Directory Federation Services 2.0 sends encrypted SAML Responses in default configurations.

Full Access
Question # 34

A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?

A.

Download and attach the documents to a Gmail message, and send them to the external vendor.

B.

Move all users from the finance org unit to the HR org unit.

C.

Enable ‘Visitor Sharing’ for the entire finance org unit.

D.

Create a group with the finance and HR users who need to share externally.

Full Access
Question # 35

As a team manager, you need to create a vacation calendar that your team members can use to share their time off. You want to use the calendar to visualize online status for team members, especially if multiple individuals are on vacation What should you do to create this calendar?

A.

Request the creation of a calendar resource, configure the calendar to “Auto-accept invitations that do not conflict,” and give your team “See all event details” access.

B.

Create a secondary calendar under your account, and give your team “Make changes to events” access.

C.

Request the creation of a calendar resource, configure the calendar to “Automatically add all invitations to this calendar,” and give your team “See only free/busy” access.

D.

Create a secondary calendar under your account, and give your team “See only free/busy” access

Full Access
Question # 36

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

A.

Extend the legal hold on the user's email data.

B.

Move project files to a Team Drive or transfer ownership.

C.

Rename the account to the new user starting next week.

D.

Delete the account, freeing up a Google Workspace License.

E.

Assign the terminated user account an Archive User license.

Full Access
Question # 37

Your organization has a group of users who interact with sensitive information and their accounts contain valuable files You need to protect these users from targeted online attacks What should you do?

A.

Enable 2-Step Verification for those users and recommend they use Google Authenticator

B.

Enable 2-Step Verification for those users and recommend they use SMS codes

C.

Disable password recovery for end users

D.

Enroll all accounts for those users in the Advanced Protection Program

Full Access
Question # 38

Your organization has confidential internal content for which only authorized employees are allowed to access Access to this content is managed by using Google Groups Only administrators can create and manage membership You need to provide only the necessary functionality and follow the principle of least privilege What should you do?

A.

Make a dynamic group so security team members are automatically added

B.

Make a moderated group so all incoming communications can be monitored

C.

Use a group as a collaborative inbox that allows easier sharing

D.

Make a security group to apply access policies

Full Access
Question # 39

Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.

What should you do?

A.

Configure a Google Group as an email list.

B.

Delegate email access to department employees.

C.

Configure a Google Group as a collaborative inbox.

D.

Configure a Google Group, and set the Access Level to Announcement Only.

Full Access
Question # 40

Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request.

What should you do?

A.

Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.

B.

Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check “Encrypt message if not encrypted”.

C.

Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.

D.

Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check “Change route” to send to your third-party encryption provider to encrypt.

Full Access
Question # 41

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.

What should you do?

A.

Turn on password expiration.

B.

Enforce 2FA with a physical security key.

C.

Use a third-party identity provider.

D.

Enforce 2FA with Google Authenticator app.

Full Access
Question # 42

The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.

What should you do?

A.

Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.

B.

Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.

C.

Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.

Full Access
Question # 43

The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one is in violation of the new security policy.

What should you do?

A.

Enable “Suspicious login” rule - Other Recipients: CTO

B.

Enable “Suspended user made active” rule - Other Recipients: CTO

C.

Enable “Email settings changed” rule - -Other Recipients: CTO

D.

Enable “Suspended user made active” rule and select “Deliver to” Super Administrator(s)

Full Access
Question # 44

Your Security Officer ran the Security Health Check and found the alert that “Installation of mobile applications from unknown sources” was occurring. They have asked you to find a way to prevent that from happening.

Using Mobile Device Management (MDM), you need to configure a policy that will not allow mobile applications to be installed from unknown sources.

What MDM configuration is needed to meet this requirement?

A.

In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.

B.

In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.

C.

In Android Settings, ensure that “Allow non-Play Store apps from unknown sources installation” is unchecked.

D.

In Device Management > Setup > Device Approvals menu, configure the “Requires Admin approval” option.

Full Access
Question # 45

A user has reported that they did not receive an email from one of their normal correspondents. What information do you need to collect from the user to investigate the cause of the issue?

A.

The email address of the sender and the subject and date/time of the missing message.

B.

The type of device the individual is using, including the OS version, browser, and browser version.

C.

The sender's domain so you can review their SPF and DKIM configuration.

D.

The sender's IP address, mail client, and mail platform.

Full Access
Question # 46

Your organization is planning to remove any dependencies on Active Directory (AD) from all Cloud applications they are using You are currently using Google Cloud Directory Sync (GCDS) with on-premises AD as a source to provision user accounts in Google Workspace. Your organization is also using a software-as-a-service (SaaS) human resources information system (HRIS) that offers integration via CSV export and Open API standard.

Additional requirements for the solution include:

• It should not require a subscription to any additional third-party service.

• The process must be automated from beginning to end.

You are tasked with the design and implementation of a solution to address user provisioning with these requirements.

What solution should you implement?

A.

Set up Azure AD and federate on-premises AD with it. Provision user accounts from Azure AD with the Google-recommended process.

B.

Modify the GCDS configuration to use the HRIS application as the data source and complete any necessary adjustments

C.

Export HRIS data to a CSV file every day. and build a solution to define the delta with the previous day;

import the result as a CSV file via the Admin console.

D.

Build an application that will fetch updated data from the HRIS system via Open API. and then update

Google Workspace with the Directory API accordingly.

Full Access
Question # 47

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.

What two actions should you take? (Choose two.)

A.

Configure objectionable content to reject messages with the words “wire transfer.”

B.

Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.

C.

Create a rule requiring secure transport for all messages regarding wire transfers.

D.

Add the sender of the wire transfer email to the blocked senders list.

E.

Enable all admin settings in Gmail's safety > spoofing and authentication.

Full Access
Question # 48

You want to create a list of IP addresses that are approved to send email to your domain. To accomplish this, what section of the Google Workspace Admin console should you update?

A.

Bypass spam filter

B.

Content compliance rule

C.

Approved email denylist

D.

Email allowlist

Full Access
Question # 49

Your large organization, 80,000 users, has been on Google for two years. Your CTO wants to create an integrated team experience with Google Groups, Teams Drives, and Calendar. Users will use a Google Form and Apps Script to request a new “G-Team.” A “G-Team’ is composed of a Google Group and a Team Drive/ Secondary Calendar that is shared using that Google Group.

What two design decisions are required to implement this workflow securely? (Choose two.)

A.

The Apps Script will need to run as a Google Workspace admin.

B.

You will need a Cloud SQL instance to store “G-Team’ data.

C.

The Google Form will need to be limited to internal users only.

D.

The Apps Script will need to run on a timed interval to process new entries.

E.

The Google Form will need to enforce Group naming conventions.

Full Access
Question # 50

A user reached out to the IT department about a Google Group that they own: info@company.com. The group is receiving mail, and each message is also delivered directly to the user's Gmail inbox. The user wants to be able to reply to messages directly from Gmail and have them sent on behalf of the group, not their individual account. Currently, their replies come from their individual account. What would you instruct the user to do?

A.

Create a new content compliance rule that matches the user's outgoing messages with the group copied, and have it modify the sender to be the group address.

B.

Add the group as an email address that can be sent from within Gmail, and verify that the user has access. They can then choose to reply from the group.

C.

Add the user's individual account as a delegate to the group's inbox. They can then toggle between the accounts and use the Gmail interface on behalf of the group.

D.

Set the group address to be the default sender within the group's posting policies.

Full Access
Question # 51

Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app.

What should you do?

A.

For the Finance OU, enable the third-party app in SAML apps.

B.

For the Finance OU, enable the third-party app in Marketplace Apps.

C.

At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.

D.

At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.

Full Access
Question # 52

A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?

A.

Use Security Investigation Tool to Search Google Drive events for all of the user's documents, and use Google Admin > Reports > Email Log Search to find their emails.

B.

Search Google Drive for all of the user’s documents, and ask them to forward all of their emails.

C.

Use the Gmail API and Google Drive API to automatically collect and export data.

D.

Utilize Google Vault to hold, search, and export data of interest.

Full Access
Question # 53

Your default Vault retention policy for Gmail is set to 365 days Your legal department has just informed you that emails sent and received by the customer support department are sensitive and must be retained for only 30 days You must enforce this new retention policy in the simplest way What should you do?

A.

Change the current default retention policy in Vault for Gmail to 30 days and apply it to the customer support organizational unit (OU) Configure a custom retention policy for Gmail for 365 days for your domain

B.

Create two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

C.

Change the current default retention policy for Gmail to 30 days Configure two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

D.

Create a custom retention policy in Vault for Gmail for 30 days and apply it to the customer support organizational unit (OU)

Full Access
Question # 54

After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff.

What should you do?

A.

Create a custom Apps Script to reset passwords.

B.

Use a third-party tool for password recovery.

C.

Enable non-admin password recovery.

D.

Create a Google form to submit reset requests.

Full Access
Question # 55

The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?

A.

Configure a safety rule to protect against encrypted attachments from untrusted senders

B.

Configure a safety rule to protect against attachments with scripts from untrusted senders.

C.

In the security sandbox section, enable virtual execution of attachments for (he targeted OU

D.

In the security sandbox section, enable virtual execution of attachments for the entire organization.

Full Access
Question # 56

You are supporting an investigation that is being conducted by your litigation team. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user’s awareness.

What two actions should you take? (Choose two.)

A.

Move the user to their own Organization Unit, and set a custom retention policy

B.

Create a matter using Google Vault, and share the matter with the litigation team members.

C.

Create a hold on the user’s mailbox in Google Vault

D.

Reset the user's password, and share the new password with the litigation team.

E.

Copy the user's data to a secondary account.

Full Access
Question # 57

All Human Resources employees at your company are members of the “HR Department” Team Drive. The HR Director wants to enact a new policy to restrict access to the “Employee Compensation” subfolder stored on that Team Drive to a small subset of the team.

What should you do?

A.

Use the Drive API to modify the permissions of the Employee Compensation subfolder.

B.

Use the Drive API to modify the permissions of the individual files contained within the subfolder.

C.

Move the contents of the subfolder to a new Team Drive with only the relevant team members.

D.

Move the subfolder to the HR Director's MyDrive and share it with the relevant team members.

Full Access
Question # 58

How can you monitor increases in user reported Spam as identified by Google?

A.

Review post-delivery activity in the Email logs.

B.

Review user-reported spam in the Investigation Tool.

C.

Review spike in user-reported spam in the Alert center.

D.

Rev]Biw post-delivery activity in the BigQuery Export.

Full Access