New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Google-Workspace-Administrator Exam Dumps - Google Cloud Certified - Professional Google Workspace Administrator

Go to page:
Question # 9

As a team manager, you need to create a vacation calendar that your team members can use to share their time off. You want to use the calendar to visualize online status for team members, especially if multiple individuals are on vacation What should you do to create this calendar?

A.

Request the creation of a calendar resource, configure the calendar to “Auto-accept invitations that do not conflict,” and give your team “See all event details” access.

B.

Create a secondary calendar under your account, and give your team “Make changes to events” access.

C.

Request the creation of a calendar resource, configure the calendar to “Automatically add all invitations to this calendar,” and give your team “See only free/busy” access.

D.

Create a secondary calendar under your account, and give your team “See only free/busy” access

Full Access
Question # 10

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace.

What should you do?

A.

Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.

B.

In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.

C.

Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.

D.

Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.

Full Access
Question # 11

As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages—whether spam, not spam, or phishing—for a specific time period. How do you find this information?

A.

Open Admin Console > Security > Dashboard > User Reports.

B.

Open Admin Console > Security > Dashboard > Spam Filter- Phishing.

C.

Use Reports API to query user Gmail activity.

D.

Open Admin Console > Reporting > Email Log Search.

Full Access
Question # 12

You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly.

What should you do?

A.

Use the bulk upload with CSV feature in the Google Workspace Admin panel to update all Groups.

B.

Update your configuration file and resync mailing lists with Google Cloud Directory Sync.

C.

Create and assign a custom admin role for all group owners so they can update settings.

D.

Use the Groups Settings API to update Google Groups with desired settings.

Full Access
Question # 13

The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's defense-in-depth strategy?

A.

Implement an IP block on the malicious user's IPs under Security Settings in the Admin Console.

B.

Use Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.

C.

Enforce higher complexity passwords by rolling it out to the affected users.

D.

Use Mobile device management geo-fencing to prevent malicious actors from using these stolen credentials.

Full Access
Question # 14

Your company policy requires that managers be provided access to Drive data once an employee leaves the company.

How should you grant this access?

A.

Make the manager a delegate to the former employee's account.

B.

Copy the data from the former employee’s My Drive to the manager's My Drive.

C.

Transfer ownership of all Drive data using the file transfer ownership tool in the Google Workspace Admin console.

D.

Login as the user and add the manager to the file permissions using the “Is owner’ privilege for all Drive files.

Full Access
Question # 15

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

A.

Remove Google Workspace license to prevent users from accessing their accounts now.

B.

Suspend users that the organization does not wish to have access.

C.

Add the users to the OU with all services disabled.

D.

Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Full Access
Question # 16

Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.

While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems. What advice would you give the development team in order to avoid the issue?

A.

Use the domain-wide delegation API to avoid the limitation per account.

B.

Use an exponential back-off algorithm to retry failed requests.

C.

Switch from REST API to gRPC protocol for performance improvement

D.

Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.

Full Access
Go to page: