Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Google-Workspace-Administrator Exam Dumps - Google Cloud Certified - Professional Google Workspace Administrator

Question # 4

Your organization is migrating to Google Workspace and wants to improve how newly created files are classified You must find a scalable solution to improve security and transparency on how to handle sensitive files What should you do?

A.

Set data loss prevention (DLP) policies to label data automatically disable label locking, and educate users

B.

Create classification labels enable automatic classification, and educate users

C.

Migrate data to Google Workspace map classifications and migrate with the Drive Labels API

D.

Integrate with the Cloud DLP API map identifiers and classifications install the Google Drive label client and run the application

Full Access
Question # 5

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

A.

Reinstall Password Sync on all domain controllers.

B.

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.

Confirm that the Password Sync service is running on all domain controllers.

D.

Reset the user's password in Active Directory.

Full Access
Question # 6

Your organization has users in the United States and Europe For compliance reasons you want to ensure that user data is always stored in the region where the user is located What should you do?

A.

Create two Google Groups titled "United States' and "Europe " Assign users to either group based on location

B.

Specify a data region policy for each Organizational Unit (OU) where users are grouped by location

C.

Populate the Address field on each user record ensuring the country information is accurate

D.

Do nothing No extra configuration is needed because user data is always stored in the region the user is located

Full Access
Question # 7

An employee has left your organization and their Drive data must be retained for three years The retention rule has been set for three years You must ensure the employee's data is visible in Vault and accessible to the Vault Administrator in the most cost-effective way What should you do?

A.

Export the users Drive data from Vault, then delete the user.

B.

Assign an Archive User (AU) license to the user

C.

Change ownership of the Drive data to the user's Manager, then delete the user

D.

Suspend the user until the end of the three-year period

Full Access
Question # 8

What steps does an administrator need to take to enforce TLS with a particular domain?

A.

Enable email safety features with the receiving domain.

B.

Set up secure transport compliance with the receiving domain.

C.

Configure an alternate secure route with the receiving domain.

D.

Set up DKIM authentication with the receiving domain.

Full Access
Question # 9

As a team manager, you need to create a vacation calendar that your team members can use to share their time off. You want to use the calendar to visualize online status for team members, especially if multiple individuals are on vacation What should you do to create this calendar?

A.

Request the creation of a calendar resource, configure the calendar to “Auto-accept invitations that do not conflict,” and give your team “See all event details” access.

B.

Create a secondary calendar under your account, and give your team “Make changes to events” access.

C.

Request the creation of a calendar resource, configure the calendar to “Automatically add all invitations to this calendar,” and give your team “See only free/busy” access.

D.

Create a secondary calendar under your account, and give your team “See only free/busy” access

Full Access
Question # 10

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace.

What should you do?

A.

Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.

B.

In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.

C.

Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.

D.

Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.

Full Access
Question # 11

As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages—whether spam, not spam, or phishing—for a specific time period. How do you find this information?

A.

Open Admin Console > Security > Dashboard > User Reports.

B.

Open Admin Console > Security > Dashboard > Spam Filter- Phishing.

C.

Use Reports API to query user Gmail activity.

D.

Open Admin Console > Reporting > Email Log Search.

Full Access
Question # 12

You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly.

What should you do?

A.

Use the bulk upload with CSV feature in the Google Workspace Admin panel to update all Groups.

B.

Update your configuration file and resync mailing lists with Google Cloud Directory Sync.

C.

Create and assign a custom admin role for all group owners so they can update settings.

D.

Use the Groups Settings API to update Google Groups with desired settings.

Full Access
Question # 13

The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's defense-in-depth strategy?

A.

Implement an IP block on the malicious user's IPs under Security Settings in the Admin Console.

B.

Use Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.

C.

Enforce higher complexity passwords by rolling it out to the affected users.

D.

Use Mobile device management geo-fencing to prevent malicious actors from using these stolen credentials.

Full Access
Question # 14

Your company policy requires that managers be provided access to Drive data once an employee leaves the company.

How should you grant this access?

A.

Make the manager a delegate to the former employee's account.

B.

Copy the data from the former employee’s My Drive to the manager's My Drive.

C.

Transfer ownership of all Drive data using the file transfer ownership tool in the Google Workspace Admin console.

D.

Login as the user and add the manager to the file permissions using the “Is owner’ privilege for all Drive files.

Full Access
Question # 15

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

A.

Remove Google Workspace license to prevent users from accessing their accounts now.

B.

Suspend users that the organization does not wish to have access.

C.

Add the users to the OU with all services disabled.

D.

Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Full Access
Question # 16

Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.

While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems. What advice would you give the development team in order to avoid the issue?

A.

Use the domain-wide delegation API to avoid the limitation per account.

B.

Use an exponential back-off algorithm to retry failed requests.

C.

Switch from REST API to gRPC protocol for performance improvement

D.

Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.

Full Access
Question # 17

All Human Resources employees at your company are members of the “HR Department” Team Drive. The HR Director wants to enact a new policy to restrict access to the “Employee Compensation” subfolder stored on that Team Drive to a small subset of the team.

What should you do?

A.

Use the Drive API to modify the permissions of the Employee Compensation subfolder.

B.

Use the Drive API to modify the permissions of the individual files contained within the subfolder.

C.

Move the contents of the subfolder to a new Team Drive with only the relevant team members.

D.

Move the subfolder to the HR Director's MyDrive and share it with the relevant team members.

Full Access
Question # 18

Users at your organization are reporting issues with Google Voice including disconnected calls and overall connection issues. You want to identify whether these issues affect just your organization or whether it's a global Google issue What should you do?

A.

Use the Security Investigation Tool with Voice Log Events as the data source field In the search operator fields select Event is and Network Statistics (client) Analyze the packet loss

B.

Verify if there is a service outage for Google Voice reported on the Google Workspace Status Dashboard

C.

Use the Security investigation Tool with User Log Events as the data source field In the search operator fields select Event is and Call failed Analyze the packet loss

D.

Verify if there is a service interruption for Google Voice reported on the Google Workspace Updates Blog website

Full Access
Question # 19

Your executive team has asked you to export all available data for 1,200 of your 1,500 Google Workspace Domain users. How should you proceed to export the data with the least amount of effort?

A.

Perform a search in Google Vault for the 500 users and export all of the results.

B.

Create a shared drive for the exports. Instruct end users to manually use Google Takeout to export the data and place the exported files in the shared drive.

C.

Contact Google Cloud support to perform the export for you.

D.

Contact Google Cloud Support to enable the Data Export tool for your organization, because you have more than 1,000 users, then use the tool to export data for the domain, and remove any unnecessary user data.

Full Access
Question # 20

Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?

A.

Create a configuration group with the approved users as members, and use it to create a target audience.

B.

Enable external sharing for the marketing and sales organizational units.

C.

Enable external sharing only to allowlisted domains provided by marketing and sales teams.

D.

Create a configuration group with the approved users as members, and enable external sharing for this group.

Full Access
Question # 21

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user’s data.

What two actions should you take? (Choose two.)

A.

Add the user's old email address to their account in the Google Workspace Admin panel.

B.

Change the user's primary email address in the Google Workspace Admin panel.

C.

Change the user's last name in the Google Workspace Admin panel.

D.

Change the user's primary email in Active Directory.

E.

Change the user's last name in Active Directory.

Full Access
Question # 22

Your organization's information security team has asked you to determine and remediate if a user (user1@example.com) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?

A.

Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is user1@example.com.

B.

Have the super administrator use the Security API to audit Drive access.

C.

As a super administrator, change the access on externally shared Drive files manually under user1@example.com.

D.

Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for user1@example.com.

Full Access
Question # 23

A user does not follow their sign-in pattern and signs In from an unusual location As an admin, what should you do in response to this alert for this user during this investigation?

A.

Add Two Factor Authentication to the Domain

B.

First suspend the account and then investigate

C.

Enhance your security alerts for tracking sign-in patterns

D.

Investigate the account for unauthorized activity in the Login and Security Audit Log

Full Access
Question # 24

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available.

What should you do?

A.

Set up unmanaged Chromeboxes and set the executives’ homepage to meet.google.com via Chrome settings.

B.

Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.

C.

Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives’ calendars.

D.

Provision managed Chromeboxes and set the executives’ Chrome homepage to meet. google.com via device policy.

Full Access
Question # 25

Your organization is expected to start using Google Workspace Enterprise Standard in several countries. During the planning phase, the change management leadership team mandates that meeting rooms near each participant’s office location should be suggested when someone creates a Google Calendar event, to simplify the user experience and avoid booking rooms when people would not be able to move easily. What should you do?

A.

Organize users for each location in separate organizational units (OUs). Add room resources to the corresponding OUs so that meeting rooms would be suggested accordingly.

B.

Organize users for each location in separate Google Groups. Add room resources to the corresponding groups so that meeting rooms would be suggested accordingly.

C.

Share each room only with the Dynamic Group defined per each user location so that they can only book the rooms nearby.

D.

Define users' work locations by setting building ID. floor name, and floor section if applicable as the-buildings and rooms are defined.

Full Access
Question # 26

The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management.

What should you do?

A.

Download the Google Workspace roadmap, and work together with a deployment specialist for new features.

B.

Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of Google Workspace.

C.

Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.

D.

Change Google Workspace release track to: Rapid Release for faster access to new features.

Full Access
Question # 27

Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail. What should you do to protect your users from future unknown malware in email attachments?

A.

Run queries in Security Investigation Tool.

B.

Turn on advanced phishing and malware protection.

C.

Enable Security Sandbox.

D.

Enable Gmail confidential mode.

Full Access
Question # 28

Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.

You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing. Which two solutions would help you mitigate the risk at minimal cost?

Choose 2 answers

A.

Deploy 2-Step Verification for all users who have security keys.

B.

Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.

C.

Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

D.

Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

E.

For all executives, create new accounts with random characters to match Google best practices, migrate

data from the former accounts, and then delete them.

Full Access
Question # 29

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?

A.

Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.

B.

Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.

C.

Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.

D.

Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.

Full Access
Question # 30

You have implemented a data loss prevention (DLP) policy for a specific finance organizational unit. You want to apply the same security policy to a shared drive owned by the finance department in the most efficient manner. What should you do?

A.

In the Admin console sharing settings, select the finance organizational unit and deselect Allow users outside the domain to access files in shared drives

B.

Assign the Shared Drive to the finance organizational unit

C.

Create a new DLP policy for shared drive users

D.

Change the scope of the policy to apply to all in the domain

Full Access
Question # 31

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

A.

Review the authorized applications for each user via the Google Workspace Admin panel.

B.

Create a survey via Google forms, and collect the application data from users.

C.

Review the token audit log, and compile a list of all the applications and their scopes.

D.

Review the API permissions installed apps list, and export the list.

Full Access
Question # 32

Your organization has enabled spoofing protection against unauthenticated domains. You are receiving complaints that email from multiple partners is not being received. While investigating this issue, you find that emails are all being sent to quarantine due to the configured safety setting. What should be the next step to allow uses to review these emails and reduce the internal complaints while keeping your environment secure?

A.

Add your partner domains IPs to the Inbound Gateway setting.

B.

Change the spoofing protection to deliver the emails to spam instead of quarantining them.

C.

Add your partner sending IP addresses to an allowlist.

D.

Change the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.

Full Access
Question # 33

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?

A.

Delete the user's account in the Admin Console.

B.

Transfer data between end user Workspace accounts.

C.

Instruct a Google Vault admin to create a matter, and place all the user data on ‘hold.’

D.

Use Google Vault to export all the user data and share among the security team.

Full Access
Question # 34

Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.

What two features are essential to reconfigure in Google Workspace? (Choose two.)

A.

Apps > add SAML apps to your domain.

B.

Reconfigure user provisioning via Google Cloud Directory Sync.

C.

Replace the third-party IDP verification certificate.

D.

Disable SSO with third party IDP.

E.

Enable API Permissions for Google Cloud Platform.

Full Access
Question # 35

You have enrolled a new Google Meet hardware device for an existing conference room in your building Your users report that the new hardware in the conference does not show the expected calendar events You need to investigate and fix the problem What should you do?

A.

Make sure that the conference room resource calendar has been created and that the Meet Hardware is associated with that resource

B.

Create a brand new resource calendar and associate the Meet Hardware with that new resource

C.

Use the Meet Quality Tool in the control panel to search for the newly installed Meet Hardware

D.

Make sure the Access permissions for the resource calendar is set to "See all event details

Full Access
Question # 36

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?

A.

Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”

B.

Admin.google.com > Reporting > Reports > Apps Reports > Gmail

C.

chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com

D.

Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Full Access
Question # 37

Your sales team, which is organized as its own organizational unit, is prone to receiving malicious attachments. What action should you take, as an administrator, to apply an additional layer of protection in the admin console for your sales team without disrupting business operation?

A.

Configure an attachment compliance rule to send any emails with attachments received by users within the sales team organizational unit to an administrator quarantine.

B.

Configure an attachment compliance rule to strip any attachments received by users within the sales team organizational unit.

C.

Configure the security sandbox feature on the sales team organizational unit.

D.

Update the Email Allowlist in the admin console to only include IP addresses of known senders.

Full Access
Question # 38

You have configured your Google Workspace account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new

features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization.

What should you do?

A.

Create a new OU and tum on the rapid release track just for this OU.

B.

Create a new Google Group with test users and enable the rapid release track.

C.

Establish a separate Dev environment, and set it to rapid release.

D.

Ask Google for a demo account with beta access to the new features.

Full Access
Question # 39

You are configuring a customer relationship management (CRM) solution to integrate with Google Workspace services for the sales department at your organization The CRM solution is in the Google Workspace Marketplace and you deploy the specific CRM solution Employees report that there are no contacts and documents visible in the CRM solution You must identify and fix the problem What should you do?

A.

Check the OAuth scopes and ensure that Drive and Gmail scopes are granted for the CRM solution

B.

Check if Manage access to apps is set to Allow users to install and run any app from the Marketplace

C.

Revoke all OAuth scopes and reinstall the CRM solution for just the sales department.

D.

Check if the App distribution settings are set to ON for everyone in your organization

Full Access
Question # 40

As a Workspace Administrator, you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

A.

Download the company owned inventory template CSV file from the admin panel, enter the serial number of the devices, and upload it back to the company owned inventory in the admin panel.

B.

Download the company owned inventory template CSV file from the admin panel, enter the Device OS, serial number and upload it back to the company owned inventory in the admin panel.

C.

Download the company owned inventory template CSV file from the admin panel, enter the asset tag of the devices, and upload it back to the company owned inventory in the admin panel.

D.

Download the company owned inventory template CSV file from the admin panel, enter the Device OS, asset tag and upload it back to the company owned inventory in the admin panel.

Full Access
Question # 41

Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes.

What action should you take?

A.

Company Profile > Profile > New User Features > Enable “Scheduled Release”

B.

Apps > Google Workspace > Gmail > Uncheck “Enable Gmail Labs for my users”

C.

Company Profile > Profile > New User Features > Enable “Rapid Release”

D.

Device Management > Chrome > Device Settings > Stop auto-updates

Full Access
Question # 42

Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.

Where do you find the information your CISO is interested in seeing?

A.

Security > Advanced Security Settings > Phishing Attempts

B.

Apps > Google Workspace > Gmail > Phishing Attempts

C.

Security > Dashboard > Spam Filter: Phishing

D.

Reporting > Reports > Phishing

Full Access
Question # 43

Your company is using Google Workspace Business Standard. The company has five meeting rooms that are all registered as resources in Google Workspace and used on a daily basis by the employees when organizing meetings. The office layout was changed last weekend, and one of the meeting rooms is now a dedicated room for management. The CEO is complaining that anyone can book the room and requested this room to be used only by the management team and their executive assistants (EAs). No one else must be allowed to book it via Google Calendar. What should you do?

A.

As a super administrator, modify the room calendar sharing settings, and limit it to the management and EAs group.

B.

Delete the room from Google Workspace resources, and suggest using a spreadsheet shared with the management and EAs only for the room schedule.

C.

As a super administrator, create a group calendar named “Management Room,” and share it only with the management and the EAs.

D.

Move the room resource to the management and EAs group so that only they can use it.

Full Access
Question # 44

Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?

A.

Modify your Marketplace Settings to block users from installing any app from the Marketplace.

B.

Set all API services to “restricted access” and ensure that all connected apps have limited access.

C.

Remove all client IDs and scopes from the list of domain-wide delegation API clients.

D.

Block each connected app's access.

Full Access
Question # 45

As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data. What should you do?

A.

Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.

B.

Open Admin Console > Security > API Controls > App Access Control > Manage Google Services.

C.

Open Admin Console > Security > Less Secure Apps.

D.

Open Admin Console > Security > API Controls > App Access Control > Settings.

Full Access
Question # 46

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

A.

Extend the legal hold on the user's email data.

B.

Move project files to a Team Drive or transfer ownership.

C.

Rename the account to the new user starting next week.

D.

Delete the account, freeing up a Google Workspace License.

E.

Assign the terminated user account an Archive User license.

Full Access
Question # 47

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?

A.

Assign the pre-built security admin role to the security team members.

B.

Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.

C.

Assign the Super Admin Role to the security team members.

D.

Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.

Full Access
Question # 48

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?

A.

Set up the shared drive, and add the users as Content Managers of the drive.

B.

Set up the shared drive, and add the users as editors of the drive.

C.

Set up the shared drive, and add the users as Contributors of the drive.

D.

Set up the shared drive, and add the users as Managers of the drive.

Full Access
Question # 49

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.

What should you do?

A.

Run the Transfer Tool for Unmanaged users.

B.

Use a Google Form to survey the Marketing department users.

C.

Assure the VP that there is no action required to configure Google Workspace.

D.

Contact Google Enterprise Support to identify affected users.

Full Access
Question # 50

As a Workspace Administrator you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

A.

Download the company-owned inventory template CSV file from the Admin panel enter the serial number of the devices and upload the

B.

completed file to the company-owned inventory in the admin panel B O Download the company-owned inventory template CSV file from the Admin panel enter the device OSs. and serial numbers and upload the

C.

completed file to the company-owned inventory in the admin panel. C O Download the company-owned inventory template CSV file from the Admin panel enter the asset tags of the devices, and upload the

D.

completed file to the company-owned inventory in the admin panel D O Download the company-owned inventory template CSV file from the Admin panel, enter the device OSs. and asset tags, and upload the

Full Access
Question # 51

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.” You are responsible for making sure that users cannot remove the footer.

What should you do?

A.

Send an email to each sales person with the instructions on how to add the footer to their Signature.

B.

Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.

C.

Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.

D.

Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.

Full Access
Question # 52

Your organization has upgraded to a Google Workspace edition with Vault and has hired a new audit team You are configuring access for this audit team with these privileges

• Chief legal executive - reporting privileges

• Legal audit manager - full Vault privileges

• Data reviewer - searching privileges

You must enable access for these three roles What should you do?

A.

Set up Google Vault service as On for these specific users.

B.

Assign Google Vault licenses to these users that allow all privileges required for access

C.

Set up an Admin role with minimal Vault privileges and assign the rote to all Vault users Approve additional privileges that are requested through a formal approval process

D.

Set up three different Admin roles with specific privileges that match the audit teams responsibilities Assign these Admin roles to the respective users.

Full Access
Question # 53

You are in the middle of migrating email from on-premises Microsoft Exchange to Google Workspace. Users that you have already migrated are complaining of messages from internal users going into spam folders. What should you do to ensure that internal messages do not go into Gmail spam while blocking spoofing attempts?

A.

Train users to click on Not Spam button for emails.

B.

Add all users of your domain to an approved sender list.

C.

Force TLS for your domain.

D.

Ensure that your inbound gateway is configured with all of your Exchange server IP addresses.

Full Access
Question # 54

You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.

Which configuration should you implement?

A.

Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.

B.

Provision accounts within your domain for the external users, and turn off external sharing for that Org.

C.

Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.

D.

Create a Team Drive for this engagement, and limit the memberships and sharing settings.

Full Access
Question # 55

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.

What should you do?

A.

Turn on password expiration.

B.

Enforce 2FA with a physical security key.

C.

Use a third-party identity provider.

D.

Enforce 2FA with Google Authenticator app.

Full Access
Question # 56

As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager. As the Workspace Administrator, what should you do to preserve this user's Drive data?

A.

In the user deletion process, select “Transfer” in the data in other apps section and add the manager's email address.

B.

Use Google Vault to set a retention period on the OU where the users reside.

C.

Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.

D.

Ask the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.

Full Access
Question # 57

Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.

What should you do?

A.

Use the conflict account remove tool to remove the accounts from Google Workspace.

B.

Rename the accounts to temp@your-company.com, and recreate the accounts.

C.

Ask users to request a new Google Workspace account from your local admin.

D.

Use the Transfer tool for unmanaged users to find the conflict accounts.

Full Access
Question # 58

An administrator accidentally deleted several Workspace user accounts from the Google Admin Console two weeks ago. How can you recover the deleted user accounts?

A.

Open a Google support ticket, and request a recovery of all recently deleted users.

B.

Sign in to the Admin console as Help Desk Admin, open user management, filter for "recently deleted." and recover.

C.

Sign in to the Admin console as Super Admin, open user management, filter for "recently deleted." and recover.

D.

Create a matter, go to legal hold, and create a legal hold for the user accounts.

Full Access