Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! Google-Workspace-Administrator Google Cloud Certified - Professional Google Workspace Administrator is now Stable and With Pass Result

Google-Workspace-Administrator Practice Exam Questions and Answers

Google Cloud Certified - Professional Google Workspace Administrator

Last Update 1 day ago
Total Questions : 160

Google-Workspace-Administrator is stable now with all latest exam questions are added 1 day ago. Just download our Full package and start your journey with Google Cloud Certified - Professional Google Workspace Administrator certification. All these Google Google-Workspace-Administrator practice exam questions are real and verified by our Experts in the related industry fields.

Google-Workspace-Administrator PDF

Google-Workspace-Administrator PDF (Printable)
$48
$119.99

Google-Workspace-Administrator Testing Engine

Google-Workspace-Administrator PDF (Printable)
$56
$139.99

Google-Workspace-Administrator PDF + Testing Engine

Google-Workspace-Administrator PDF (Printable)
$70.8
$176.99
Question # 1

Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.

What should you do?

Options:

A.  

Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.

B.  

Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.

C.  

Create a blocked senders list at the Sales OU that contains the mass email sender addresses.

D.  

Create an approved senders list at the Market Research OU that contains the mass email sender addresses.

Discussion 0
Question # 2

Your marketing department needs an easy way for users to share items more appropriately. They want to easily link-share Drive files within the marketing department, without sharing them with your entire company. What should you do to fulfil this request? (Choose two.)

Options:

A.  

Create a shared drive that's shared internally organization-wide.

B.  

Update Drive sharing for the marketing department to restrict to internal.

C.  

Create a shared drive for internal marketing use.

D.  

Update the link sharing default to the marketing team when creating a document.

E.  

In the admin panel Drive settings, create a target audience that has all of marketing as members.

Discussion 0
Question # 3

Your organization has enabled spoofing protection against unauthenticated domains. You are receiving complaints that email from multiple partners is not being received. While investigating this issue, you find that emails are all being sent to quarantine due to the configured safety setting. What should be the next step to allow uses to review these emails and reduce the internal complaints while keeping your environment secure?

Options:

A.  

Add your partner domains IPs to the Inbound Gateway setting.

B.  

Change the spoofing protection to deliver the emails to spam instead of quarantining them.

C.  

Add your partner sending IP addresses to an allowlist.

D.  

Change the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.

Discussion 0
Question # 4

Your organization wants to grant Google Vault access to an external regulatory authority. In an effort to comply with an investigation, the external group needs the ability to view reports in Google Vault. What should you do?

Options:

A.  

Create accounts for external users and assign Vault privileges.

B.  

Share Vault access with external users.

C.  

Assign an Archived User license to the external users.

D.  

Temporarily assign the super admin role to the users

Discussion 0
Question # 5

Your sales team, which is organized as its own organizational unit, is prone to receiving malicious attachments. What action should you take, as an administrator, to apply an additional layer of protection in the admin console for your sales team without disrupting business operation?

Options:

A.  

Configure an attachment compliance rule to send any emails with attachments received by users within the sales team organizational unit to an administrator quarantine.

B.  

Configure an attachment compliance rule to strip any attachments received by users within the sales team organizational unit.

C.  

Configure the security sandbox feature on the sales team organizational unit.

D.  

Update the Email Allowlist in the admin console to only include IP addresses of known senders.

Discussion 0
Question # 6

Your organization is in the process of deploying Google Drive for desktop so that your users can access Drive files directly from their desktops. For security reasons, you want to restrict Drive for desktop to only company-owned devices. What two steps should you take from the admin panel to restrict Drive for desktop to only company-owned devices?

Choose 2 answers

Options:

A.  

Create a company-owned device inventory using an asset tag.

B.  

Devices > Endpoints > Add a filter-> Management Type > Drive for desktop > Apply

C.  

Apps > Google Workspace > Drive and Docs > Features and Applications > Google Drive for Desktop > Only Allow Google Drive for desktop on authorized devices

D.  

Install the Google Endpoint Verification extension on machines using Drive for Desktop.

E.  

Create a company-owned device inventory using serial numbers of devices.

Discussion 0
Question # 7

Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration.

Which scenario could require an alternative deployment strategy?

Options:

A.  

Some of your Active Directory groups have sensitive group membership.

B.  

Some of the Active Directory groups do not have owners.

C.  

Some of the Active Directory groups have members external to organization.

D.  

Some of the Active Directory groups do not have email addresses.

Discussion 0
Question # 8

As a Workspace Administrator, you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

Options:

A.  

Download the company owned inventory template CSV file from the admin panel, enter the serial number of the devices, and upload it back to the company owned inventory in the admin panel.

B.  

Download the company owned inventory template CSV file from the admin panel, enter the Device OS, serial number and upload it back to the company owned inventory in the admin panel.

C.  

Download the company owned inventory template CSV file from the admin panel, enter the asset tag of the devices, and upload it back to the company owned inventory in the admin panel.

D.  

Download the company owned inventory template CSV file from the admin panel, enter the Device OS, asset tag and upload it back to the company owned inventory in the admin panel.

Discussion 0
Question # 9

Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook. How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?

Options:

A.  

Allow external sharing with the auditor using the ‘Trusted Domains’ feature.

B.  

Enable the ‘Visitor Sharing’ feature, and demonstrate it to the Finance team.

C.  

Use the ‘Publish’ feature in the Sheets editor to share the contents externally.

D.  

Attach the Sheet file to an email message, and send to the external auditor.

Discussion 0
Question # 10

A user does not follow their usual sign-in pattern and signs in from an unusual location.

What type of alert is triggered by this event?

Options:

A.  

Suspicious mobile activity alert.

B.  

Suspicious login activity alert.

C.  

Leaked password alert.

D.  

User sign-in alert.

Discussion 0
Question # 11

Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.

You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing. Which two solutions would help you mitigate the risk at minimal cost?

Choose 2 answers

Options:

A.  

Deploy 2-Step Verification for all users who have security keys.

B.  

Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.

C.  

Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

D.  

Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

E.  

For all executives, create new accounts with random characters to match Google best practices, migrate

data from the former accounts, and then delete them.

Discussion 0
Question # 12

Your company’s compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company’s account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.

Which combination of attributes will meet this objective?

Options:

A.  

Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.

B.  

Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers

> choose Reject

C.  

Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.

D.  

Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.

Discussion 0
Question # 13

Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, customercare@your-company.com to the cloud platform’s email address, your-company@cloudprovider.com. As a security measure, you have mail forwarding disabled at the domain level.

What should you do?

Options:

A.  

Create a mail contact in the Google Workspace directory that has an email address of your- company@cloudprovider.com

B.  

Create a rule to forward mail in the customercare@your-company.com mailbox to your- company@cloudprovider.com

C.  

Create a recipient map in the Google Workspace Admin console that maps customercare@your-company.com to your-company@cloudprovider.com

D.  

Create a content compliance rule in the Google Workspace Admin console to change route to your- company@cloudprovider.com

Discussion 0
Question # 14

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace.

What should you do?

Options:

A.  

Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.

B.  

In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.

C.  

Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.

D.  

Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.

Discussion 0
Question # 15

Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information.

What should you do?

Options:

A.  

Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.

B.  

Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.

C.  

Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

D.  

Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

Discussion 0
Question # 16

You received this email from the head of marketing:

Hello Workspace Admin:

Next week, a new consultant will be starting on the "massive marketing mailing" project. We want to ensure that they can view contact details of the rest of the marketing team, but they should not have access to view contact details of anyone else here at our company. Is this something that you can help with?

What are two of the steps you need to perform to fulfill this request?

Choose 2 answers

Options:

A.  

Create an isolated OU for the consultants who need the restricted contacts access.

B.  

Create a group that includes the contacts that the consultant is allowed to view.

C.  

Apply the role of owner to the consultant in the group settings.

D.  

Create the consultant inside under the marketing OU.

E.  

Ensure that you are assigned the Administrator Privilege of Services > Services settings, and ensure that Services > Contacts > Contacts Settings Message is set.

Discussion 0
Question # 17

Your organization recently implemented context-aware access policies for Google Drive to allow users to access Drive only from corporate managed desktops. Unfortunately, some users can still access Drive from non-corporate managed machines. What preliminary checks should you perform to find out why the Context-Aware Access policy is not working as intended? (Choose two.)

Options:

A.  

Confirm that the user has a Google Workspace Enterprise Plus license.

B.  

Delete and recreate a new Context-Aware Access device policy.

C.  

Check whether device policy application is installed on users’ devices.

D.  

Confirm that the user has at least a Google Workspace Business license.

E.  

Check whether Endpoint Verification is installed on users’ desktops.

Discussion 0
Question # 18

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?

Options:

A.  

Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”

B.  

Admin.google.com > Reporting > Reports > Apps Reports > Gmail

C.  

chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com

D.  

Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Discussion 0
Question # 19

The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one is in violation of the new security policy.

What should you do?

Options:

A.  

Enable “Suspicious login” rule - Other Recipients: CTO

B.  

Enable “Suspended user made active” rule - Other Recipients: CTO

C.  

Enable “Email settings changed” rule - -Other Recipients: CTO

D.  

Enable “Suspended user made active” rule and select “Deliver to” Super Administrator(s)

Discussion 0
Question # 20

User A is a Basic License holder. User B is a Business License holder. These two users, along with many additional users, are in the same organizational unit at the same company. When User A attempts to access Drive, they receive the following error: “We are sorry, but you do not have access to Google Docs Editors. Please contact your Organization Administrator for access.” User B is not presented with the same error and accesses the service without issues.

How do you provide access to Drive for User A?

Options:

A.  

Select User A in the Directory, and under the Apps section, check whether Drive and Docs is disabled. If so, enable it in the User record.

B.  

In Apps > Google Workspace > Drive and Docs, select the organizational unit the users are in and enable Drive for the organizational unit.

C.  

In Apps > Google Workspace, determine the Group that has Drive and Docs enabled as a service. Add User A to this group.

D.  

Select User A in the Directory, and under the Licenses section, change their license from Basic to Business to add the Drive and Docs service.

Discussion 0
Question # 21

In the years prior to your organization moving to Google Workspace, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on Google Workspace.) You were able to address active employees’ use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account.

What should you do?

Options:

A.  

Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-Google Workspace Google services and have them blocked.

B.  

Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.

C.  

Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.

D.  

Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all Google Workspace and Other Google Services disabled.

Discussion 0
Question # 22

Your organization has noticed several incidents of accidental oversharing inside the organization. Specifically, several users have shared sensitive Google Drive items with the entire organization by clicking ‘anyone in this group with this link can view’. You have been asked by senior management to help users share more appropriately and also to prevent accidental oversharing to the entire organization. How would you best accomplish this?

Options:

A.  

Create groups, add users accordingly, and educate users on how to share to specific groups of people.

B.  

Disable sharing to the entire organization so that users must consciously add every person who needs access.

C.  

Determine sharing boundaries for users that work with sensitive information, and then implement target audiences.

D.  

Temporarily disable the Google Drive service for individuals who continually overshare.

Discussion 0
Question # 23

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?

Options:

A.  

Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.

B.  

Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.

C.  

Set the option "Allow calendar-based room release" for all targeted rooms.

D.  

Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.

Discussion 0
Question # 24

Your large organization, 80,000 users, has been on Google for two years. Your CTO wants to create an integrated team experience with Google Groups, Teams Drives, and Calendar. Users will use a Google Form and Apps Script to request a new “G-Team.” A “G-Team’ is composed of a Google Group and a Team Drive/ Secondary Calendar that is shared using that Google Group.

What two design decisions are required to implement this workflow securely? (Choose two.)

Options:

A.  

The Apps Script will need to run as a Google Workspace admin.

B.  

You will need a Cloud SQL instance to store “G-Team’ data.

C.  

The Google Form will need to be limited to internal users only.

D.  

The Apps Script will need to run on a timed interval to process new entries.

E.  

The Google Form will need to enforce Group naming conventions.

Discussion 0
Question # 25

A user is reporting that after they sign in to Gmail, their labels are not loading and buttons are not responsive. What action should you take to troubleshoot this issue with the user?

Options:

A.  

Collect full message headers for examination.

B.  

Check whether the issue occurs when the user authenticates on a different device or a new incognito window.

C.  

Check whether a ping test to service.gmail.com (pop.gmail.com or imap.gmail.com) is successful.

D.  

Check whether traceroute to service.gmail.com (pop.gmail.com or imap.gmail.com) is successful.

Discussion 0
Question # 26

Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?

Options:

A.  

Modify your Marketplace Settings to block users from installing any app from the Marketplace.

B.  

Set all API services to “restricted access” and ensure that all connected apps have limited access.

C.  

Remove all client IDs and scopes from the list of domain-wide delegation API clients.

D.  

Block each connected app's access.

Discussion 0
Question # 27

Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.

What two features are essential to reconfigure in Google Workspace? (Choose two.)

Options:

A.  

Apps > add SAML apps to your domain.

B.  

Reconfigure user provisioning via Google Cloud Directory Sync.

C.  

Replace the third-party IDP verification certificate.

D.  

Disable SSO with third party IDP.

E.  

Enable API Permissions for Google Cloud Platform.

Discussion 0
Question # 28

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?

Options:

A.  

Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.

B.  

Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.

C.  

Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.

D.  

Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.

Discussion 0
Question # 29

Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.

While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems. What advice would you give the development team in order to avoid the issue?

Options:

A.  

Use the domain-wide delegation API to avoid the limitation per account.

B.  

Use an exponential back-off algorithm to retry failed requests.

C.  

Switch from REST API to gRPC protocol for performance improvement

D.  

Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.

Discussion 0
Question # 30

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?

Options:

A.  

Delete the user's account in the Admin Console.

B.  

Transfer data between end user Workspace accounts.

C.  

Instruct a Google Vault admin to create a matter, and place all the user data on ‘hold.’

D.  

Use Google Vault to export all the user data and share among the security team.

Discussion 0
Question # 31

Your organization implemented Single Sign-On (SSO) for the multiple cloud-based services it uses. During authentication, one service indicates that access to the SSO provider is not possible due to invalid information. What should you do?

Options:

A.  

Update the validation certificate.

B.  

Verify that the Audience element in the SAML Response matches the assertion consumer service (ACS) URL

C.  

Run nslookup to confirm that the service exists.

D.  

Ensure that Microsoft's Active Directory Federation Services 2.0 sends encrypted SAML Responses in default configurations.

Discussion 0
Question # 32

You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location. How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?

Options:

A.  

Configure a data region at the top level OU of your organization, and set the value to “Europe”.

B.  

Add three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.

C.  

Configure a configuration group for European users, and set the data region to “Europe”.

D.  

Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.

Discussion 0
Question # 33

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?

Options:

A.  

Assign the pre-built security admin role to the security team members.

B.  

Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.

C.  

Assign the Super Admin Role to the security team members.

D.  

Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.

Discussion 0
Question # 34

Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)

Options:

A.  

Provide your current GCDS instance with admin credentials to the recently acquired organization's LDAP directory.

B.  

Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.

C.  

Set up exclusion rules to ensure that users synced from the acquired organization's LDAP are not, suspended.

D.  

Set up an additional instance of GCDS running on another server, and handle the acquired organization's synchronization.

E.  

Upgrade to the multiple LDAP version of GCDS.

Discussion 0
Question # 35

You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.

Which configuration should you implement?

Options:

A.  

Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.

B.  

Provision accounts within your domain for the external users, and turn off external sharing for that Org.

C.  

Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.

D.  

Create a Team Drive for this engagement, and limit the memberships and sharing settings.

Discussion 0
Question # 36

As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore from one satellite office and that they receive an error message that “a company policy is blocking access to this app.” The users have no issue with Gmail or Google Calendar. While investigating, you learn that both this office's Internet Service Provider (ISP) and the global IP address when accessing the internet were changed over the weekend. What is the most logical reason for this issue?

Options:

A.  

An access level was defined based on the IP range and applied to Google Drive via Context-Aware Access.

B.  

Under Drive and Docs > Sharing Settings, the “Whitelisted domains” list needs to be updated to add the new ISP domain.

C.  

The Network Mask defined in Security > Settings > SSO with 3rd Party IdPs should be updated to reflect the new IP range.

D.  

You need to raise a ticket to Google Cloud Support to have your new IP ranges registered for Drive API access.

Discussion 0
Question # 37

What action should be taken to configure alerting related to phishing attacks?

Options:

A.  

Set up a Token audit log event alert.

B.  

Set up an Admin audit log event alert.

C.  

Set up an email settings changed alert.

D.  

Set up a suspicious login event alert.

Discussion 0
Question # 38

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

Options:

A.  

Review the authorized applications for each user via the Google Workspace Admin panel.

B.  

Create a survey via Google forms, and collect the application data from users.

C.  

Review the token audit log, and compile a list of all the applications and their scopes.

D.  

Review the API permissions installed apps list, and export the list.

Discussion 0
Question # 39

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available.

What should you do?

Options:

A.  

Set up unmanaged Chromeboxes and set the executives’ homepage to meet.google.com via Chrome settings.

B.  

Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.

C.  

Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives’ calendars.

D.  

Provision managed Chromeboxes and set the executives’ Chrome homepage to meet. google.com via device policy.

Discussion 0
Question # 40

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

Options:

A.  

Reinstall Password Sync on all domain controllers.

B.  

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.  

Confirm that the Password Sync service is running on all domain controllers.

D.  

Reset the user's password in Active Directory.

Discussion 0
Question # 41

A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?

Options:

A.  

Download and attach the documents to a Gmail message, and send them to the external vendor.

B.  

Move all users from the finance org unit to the HR org unit.

C.  

Enable ‘Visitor Sharing’ for the entire finance org unit.

D.  

Create a group with the finance and HR users who need to share externally.

Discussion 0
Question # 42

Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as “view data for all teams” to the HR group, but it is reporting an error when accessing the application. What should you do?

Options:

A.  

Allocate the “view data for all teams” permission to all employees of the company.

B.  

Confirm that the Work Insights app is turned ON for all employees.

C.  

Confirm in Security > API controls > App Access Controls that Work Insights API is set to “unrestricted.”

D.  

Confirm in Reports > BigQuery Export that the job is enabled.

Discussion 0
Question # 43

You are a Workspace Administrator with a mix of Business Starter and Standard Licenses for your users. A Business Starter User in your domain mentions that they are running out of Drive Storage Quota. Without deleting data from Drive, what two actions can you take to alleviate the quota concerns for this user? (Choose two.)

Options:

A.  

Add other users as “Editors” on the Drive object, thus spreading the storage quota debt between all of them.

B.  

Manually export and back up the data locally, and delete the affected files from Drive to alleviate the debt.

C.  

Make another user the “Owner” of the Drive objects, thus transferring the storage quota debt to them.

D.  

Perform an API query for large storage drive objects, and delete them, thus alleviating the quota debt.

E.  

Move the affected items to a Shared Drive. Shared Drives transfer ownership of the drive item to the domain itself, which alleviates the quota debt from that user.

Discussion 0
Question # 44

As the Workspace Administrator, you have been asked to configure Google Cloud Directory Sync (GCDS) in order to manage Google Group memberships from an internal LDAP server. However, multiple Google Groups must have their memberships managed manually. When you run the GCDS sync, you notice that these manually managed groups are being deleted. What should you do to prevent these groups from being deleted?

Options:

A.  

In the GCDS configuration manager, update the group deletion policy setting to “don't delete Google groups not found in LDAP.”

B.  

Use the Directory API to check and update the group’s membership after the GCDS sync is completed.

C.  

Confirm that the base DN for the group email address attribute matches the base DN for the user email address attribute.

D.  

In the user attribute settings of the GCDS configuration manager options, set the Google domain users deletion/suspension policy to “delete only active Google domain users not found in LDAP.”

Discussion 0
Question # 45

After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.

What should you do?

Options:

A.  

Add the legal team to the User Management Admin system role.

B.  

Add the legal team to the Google Vault Google Group.

C.  

Create a custom role with Google Vault access, and add the legal team.

D.  

Create a matter in Google Vault, and share with the legal team.

Discussion 0
Get Google-Workspace-Administrator dumps and pass your exam in 24 hours!

Free Exams Sample Questions