New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Google-Workspace-Administrator Exam Dumps - Google Cloud Certified - Professional Google Workspace Administrator

Go to page:
Question # 41

Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes.

What action should you take?

A.

Company Profile > Profile > New User Features > Enable “Scheduled Release”

B.

Apps > Google Workspace > Gmail > Uncheck “Enable Gmail Labs for my users”

C.

Company Profile > Profile > New User Features > Enable “Rapid Release”

D.

Device Management > Chrome > Device Settings > Stop auto-updates

Full Access
Question # 42

Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.

Where do you find the information your CISO is interested in seeing?

A.

Security > Advanced Security Settings > Phishing Attempts

B.

Apps > Google Workspace > Gmail > Phishing Attempts

C.

Security > Dashboard > Spam Filter: Phishing

D.

Reporting > Reports > Phishing

Full Access
Question # 43

Your company is using Google Workspace Business Standard. The company has five meeting rooms that are all registered as resources in Google Workspace and used on a daily basis by the employees when organizing meetings. The office layout was changed last weekend, and one of the meeting rooms is now a dedicated room for management. The CEO is complaining that anyone can book the room and requested this room to be used only by the management team and their executive assistants (EAs). No one else must be allowed to book it via Google Calendar. What should you do?

A.

As a super administrator, modify the room calendar sharing settings, and limit it to the management and EAs group.

B.

Delete the room from Google Workspace resources, and suggest using a spreadsheet shared with the management and EAs only for the room schedule.

C.

As a super administrator, create a group calendar named “Management Room,” and share it only with the management and the EAs.

D.

Move the room resource to the management and EAs group so that only they can use it.

Full Access
Question # 44

Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?

A.

Modify your Marketplace Settings to block users from installing any app from the Marketplace.

B.

Set all API services to “restricted access” and ensure that all connected apps have limited access.

C.

Remove all client IDs and scopes from the list of domain-wide delegation API clients.

D.

Block each connected app's access.

Full Access
Question # 45

As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data. What should you do?

A.

Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.

B.

Open Admin Console > Security > API Controls > App Access Control > Manage Google Services.

C.

Open Admin Console > Security > Less Secure Apps.

D.

Open Admin Console > Security > API Controls > App Access Control > Settings.

Full Access
Question # 46

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

A.

Extend the legal hold on the user's email data.

B.

Move project files to a Team Drive or transfer ownership.

C.

Rename the account to the new user starting next week.

D.

Delete the account, freeing up a Google Workspace License.

E.

Assign the terminated user account an Archive User license.

Full Access
Question # 47

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?

A.

Assign the pre-built security admin role to the security team members.

B.

Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.

C.

Assign the Super Admin Role to the security team members.

D.

Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.

Full Access
Question # 48

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?

A.

Set up the shared drive, and add the users as Content Managers of the drive.

B.

Set up the shared drive, and add the users as editors of the drive.

C.

Set up the shared drive, and add the users as Contributors of the drive.

D.

Set up the shared drive, and add the users as Managers of the drive.

Full Access
Go to page: