Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Google-Workspace-Administrator Exam Dumps - Associate Google Workspace Administrator

Go to page:
Question # 9

During a recent Google Meet video conference, several employees reported that they could not hear the presenters. The presenters confirmed that their laptops’ microphones were working. The affected employees were all using company-issued laptops. You need to quickly diagnose the source of the issue. What should you do first?

A.

Verify that the audio drivers on the affected laptops are up-to-date and functioning correctly.

B.

Check the Admin console to determine whether there are recent Meet-related notifications or alerts.

C.

Check if Context-Aware access rules were set to prevent Meet access from the user’s network location.

D.

Use the Meet quality tool for each affected user to analyze their microphone settings and configurations during the meeting.

Full Access
Question # 10

You’ve received multiple reports about a suspicious email from someone who is pretending to be from your organization’s human resources department. The email is prompting employees to click a link for a password update. You want to remediate this sender’s emails. What should you do?

A.

Use the security investigation tool to search for users who received the suspicious email, and select Mark message as phishing.

B.

Use the security investigation tool to action the suspicious email and select Mark message as spam.

C.

Create an activity rule to alert administrators to similar emails from that sender.

D.

Notify all employees and request that they report this email as spam.

Full Access
Question # 11

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

A.

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.

Upload the HAR file to Google Drive and share the file with the Google support representative.

Full Access
Question # 12

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Full Access
Question # 13

Your organization recently deployed Google Workspace. Over 3,000 external contacts were shared in public folders in Microsoft Exchange before the implementation. You need to ensure that these external contacts appear to domain users in Gmail. What should you do?

A.

Export the external contacts to a CSV file, upload the file to Google Drive, and instruct users to import to their My Contacts.

B.

Use Google Cloud Directory Sync to sync the external contacts from the public folders in Microsoft Exchange to the Directory.

C.

Use the Domain Shared Contacts API to add the external contacts to the Directory.

D.

Create a user account, add the external contacts, and delegate them to all users in the domain.

Full Access
Question # 14

Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?

A.

End all unsupervised meetings by using the Google Meet APIs.

B.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.

C.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.

D.

Identify and end all unsupervised meetings by using the security investigation tool.

Full Access
Question # 15

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Full Access
Question # 16

A new user at your organization is unable to access Google Meet. You have verified that the user’s account is active and the correct licenses are assigned. You need to resolve the access issue. What should you do?

A.

Check the user’s browser settings to ensure that Meet is not blocked.

B.

Instruct the user to clear their browser’s cache and cookies.

C.

Restart the user’s computer to refresh their network connection.

D.

Verify that Meet is enabled as a service for the user’s account in the Admin console.

Full Access
Go to page: