Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Google Google-Workspace-Administrator Google Cloud Certified - Professional Google Workspace Administrator Exam Practice Test

Google Cloud Certified - Professional Google Workspace Administrator Questions and Answers

Question 1

Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales

& Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access immediately if all of the following conditions are met:

  • Access to the app is restricted to specific individuals by request only.
  • The app does not have the ability to read or manage emails.
  • Immediate notice is given to the Infosec team, followed by the submission of a security risk analysis report within 14 days.

Which actions should you take first to ensure that you are compliant with Infosec policy?

Options:

A.

Move the Senior VP to a sub-OU before enabling Marketplace Settings > “Allow Users to Install Any App from Google Workspace Marketplace.”

B.

Confirm that the Senior VP’s OU has the following Gmail setting disabled before whitelisting the app: “Let users delegate access to their mailbox.”

C.

Add the Marketplace app, then review the authorized scopes in Security > Manage API client access.

D.

Search the Google Workspace support forum for feedback about the app to include in the risk analysis report.

Question 2

As a Workspace Administrator, you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

Options:

A.

Download the company owned inventory template CSV file from the admin panel, enter the serial number of the devices, and upload it back to the company owned inventory in the admin panel.

B.

Download the company owned inventory template CSV file from the admin panel, enter the Device OS, serial number and upload it back to the company owned inventory in the admin panel.

C.

Download the company owned inventory template CSV file from the admin panel, enter the asset tag of the devices, and upload it back to the company owned inventory in the admin panel.

D.

Download the company owned inventory template CSV file from the admin panel, enter the Device OS, asset tag and upload it back to the company owned inventory in the admin panel.

Question 3

Your organization has a group of users who interact with sensitive information and their accounts contain valuable files You need to protect these users from targeted online attacks What should you do?

Options:

A.

Enable 2-Step Verification for those users and recommend they use Google Authenticator

B.

Enable 2-Step Verification for those users and recommend they use SMS codes

C.

Disable password recovery for end users

D.

Enroll all accounts for those users in the Advanced Protection Program

Question 4

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user’s data.

What two actions should you take? (Choose two.)

Options:

A.

Add the user's old email address to their account in the Google Workspace Admin panel.

B.

Change the user's primary email address in the Google Workspace Admin panel.

C.

Change the user's last name in the Google Workspace Admin panel.

D.

Change the user's primary email in Active Directory.

E.

Change the user's last name in Active Directory.

Question 5

Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.

What should you do?

Options:

A.

Educate users on creating personal contacts for the Partner Employees.

B.

Add a secondary domain for the Partner Company and create user entries for each Partner user.

C.

Create shared contacts in the Directory using the Directory API.

D.

Create shared contacts in the Directory using the Domain Shared Contacts API.

Question 6

You are in the middle of migrating email from on-premises Microsoft Exchange to Google Workspace. Users that you have already migrated are complaining of messages from internal users going into spam folders. What should you do to ensure that internal messages do not go into Gmail spam while blocking spoofing attempts?

Options:

A.

Train users to click on Not Spam button for emails.

B.

Add all users of your domain to an approved sender list.

C.

Force TLS for your domain.

D.

Ensure that your inbound gateway is configured with all of your Exchange server IP addresses.

Question 7

You are a Workspace Administrator with a mix of Business Starter and Standard Licenses for your users. A Business Starter User in your domain mentions that they are running out of Drive Storage Quota. Without deleting data from Drive, what two actions can you take to alleviate the quota concerns for this user? (Choose two.)

Options:

A.

Add other users as “Editors” on the Drive object, thus spreading the storage quota debt between all of them.

B.

Manually export and back up the data locally, and delete the affected files from Drive to alleviate the debt.

C.

Make another user the “Owner” of the Drive objects, thus transferring the storage quota debt to them.

D.

Perform an API query for large storage drive objects, and delete them, thus alleviating the quota debt.

E.

Move the affected items to a Shared Drive. Shared Drives transfer ownership of the drive item to the domain itself, which alleviates the quota debt from that user.

Question 8

An employee at your organization is experiencing video call issues in Google Meet and they were unable to resolve the issues by themselves You need to troubleshoot the issue What should you do first?

Options:

A.

View the Meet quality report of the employee

B.

Ask your network administrator to add the dedicated Meet IP address range for your users

C.

Restart the device of the employee

D.

Check the Meet settings of the employee

Question 9

What action should be taken to configure alerting related to phishing attacks?

Options:

A.

Set up a Token audit log event alert.

B.

Set up an Admin audit log event alert.

C.

Set up an email settings changed alert.

D.

Set up a suspicious login event alert.

Question 10

Your organization has users in the United States and Europe For compliance reasons you want to ensure that user data is always stored in the region where the user is located What should you do?

Options:

A.

Create two Google Groups titled "United States' and "Europe " Assign users to either group based on location

B.

Specify a data region policy for each Organizational Unit (OU) where users are grouped by location

C.

Populate the Address field on each user record ensuring the country information is accurate

D.

Do nothing No extra configuration is needed because user data is always stored in the region the user is located

Question 11

As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data. What should you do?

Options:

A.

Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.

B.

Open Admin Console > Security > API Controls > App Access Control > Manage Google Services.

C.

Open Admin Console > Security > Less Secure Apps.

D.

Open Admin Console > Security > API Controls > App Access Control > Settings.

Question 12

Your company has numerous locations throughout the world. Each of these locations has multiple office managers that field questions from employees through an email alias. Some questions have not been answered by an office manager How can you create a system to assign conversations to different receptionists using Workspace?

Options:

A.

Create a Google Groups Collaborative Inbox.

B.

Use App Script to design a ticketing system that marks conversation ownership.

C.

Contract with a third-party solution, such as ServiceNow.

D.

Create Google Tasks and assign them to receptionists to address unanswered questions.

Question 13

Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?

Options:

A.

Modify your Marketplace Settings to block users from installing any app from the Marketplace.

B.

Set all API services to “restricted access” and ensure that all connected apps have limited access.

C.

Remove all client IDs and scopes from the list of domain-wide delegation API clients.

D.

Block each connected app's access.

Question 14

A user named Alice is leaving your organization You need to transfer all of Alice's data from her Drive to Bob's Drive in the most simple and efficient manner possible What should you do?

Options:

A.

Use the Google Admin console to move the files from Alice's Drive to Bob's Drive

B.

Use the Google Takeout service to export Alice's data to a zip file and instruct Bob to import the zip file into his Drive

C.

Use the Google Drive API to programmatically transfer the files from Alice's Drive to Bob's Drive

D.

Instruct Alice to download all of her files from her Drive and upload them to Bob's Drive

Question 15

Your company has acquired a new company in Japan and wants to add all employees of the acquisition to your existing Google Workspace domain. The new company will retain its original domain for email addresses and, due to the very sensitive nature of its work, the new employees should not be visible in the global directory. However, they should be visible within each company's separate directory. What should you do to meet these requirements?

Options:

A.

Create a new Google Workspace domain isolated from the existing one, and create users in the new domain instead.

B.

Under Directory Settings > Contact sharing, disable the contact sharing option and wait for 24 hours to allow the settings to propagate before creating the new employee accounts.

C.

Redesign your OU organization to have 2 child OUs for each company directly under the root. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the OU.

D.

Create one dynamic group for each company based on a custom attribute defining the company. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the dynamic group.

Question 16

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your- company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.

What steps should you take?

Options:

A.

Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.

B.

Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.

C.

Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.

D.

Set up a Default route with split delivery to route email to the on-premises server.

Question 17

Your Security Officer ran the Security Health Check and found the alert that “Installation of mobile applications from unknown sources” was occurring. They have asked you to find a way to prevent that from happening.

Using Mobile Device Management (MDM), you need to configure a policy that will not allow mobile applications to be installed from unknown sources.

What MDM configuration is needed to meet this requirement?

Options:

A.

In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.

B.

In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.

C.

In Android Settings, ensure that “Allow non-Play Store apps from unknown sources installation” is unchecked.

D.

In Device Management > Setup > Device Approvals menu, configure the “Requires Admin approval” option.

Question 18

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?

Options:

A.

Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”

B.

Admin.google.com > Reporting > Reports > Apps Reports > Gmail

C.

chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com

D.

Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Question 19

Your organization has a strict requirement that your temporary employees can only send emails to and receive emails from specific external domains You must define a policy in Google Workspace that meets this requirement for users in the temporary employee organizational unit (OU) What should you do?

Options:

A.

Create a policy in Gmail settings that rewrites the recipient for outbound messages and quarantines incoming messages to review before delivery

B.

Add the allowed domains when configuring the restrict delivery setting in Gmail settings, and select the box to bypass for internal emails

C.

Restrict sending and receiving to Google Groups, and carefully curate the temporary employees" memberships

D.

Configure the restrict delivery setting to limit domains that the temporary employees can communicate with Allow Google Docs sharing

Question 20

Your sales team, which is organized as its own organizational unit, is prone to receiving malicious attachments. What action should you take, as an administrator, to apply an additional layer of protection in the admin console for your sales team without disrupting business operation?

Options:

A.

Configure an attachment compliance rule to send any emails with attachments received by users within the sales team organizational unit to an administrator quarantine.

B.

Configure an attachment compliance rule to strip any attachments received by users within the sales team organizational unit.

C.

Configure the security sandbox feature on the sales team organizational unit.

D.

Update the Email Allowlist in the admin console to only include IP addresses of known senders.

Question 21

Your organization implemented Single Sign-On (SSO) for the multiple cloud-based services it uses. During authentication, one service indicates that access to the SSO provider is not possible due to invalid information. What should you do?

Options:

A.

Update the validation certificate.

B.

Verify that the Audience element in the SAML Response matches the assertion consumer service (ACS) URL

C.

Run nslookup to confirm that the service exists.

D.

Ensure that Microsoft's Active Directory Federation Services 2.0 sends encrypted SAML Responses in default configurations.

Question 22

A user does not follow their sign-in pattern and signs In from an unusual location As an admin, what should you do in response to this alert for this user during this investigation?

Options:

A.

Add Two Factor Authentication to the Domain

B.

First suspend the account and then investigate

C.

Enhance your security alerts for tracking sign-in patterns

D.

Investigate the account for unauthorized activity in the Login and Security Audit Log

Question 23

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

Options:

A.

Reinstall Password Sync on all domain controllers.

B.

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.

Confirm that the Password Sync service is running on all domain controllers.

D.

Reset the user's password in Active Directory.

Question 24

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?

Options:

A.

Use the security center to remove the messages from users' mailboxes

B.

Use Google Vault to remove these messages from users mailboxes.

C.

Enable a safety rule to send these types of messages to spam.

D.

Enable a safety rule to send these types of messages to a quarantine.

Question 25

You have implemented a data loss prevention (DLP) policy for a specific finance organizational unit. You want to apply the same security policy to a shared drive owned by the finance department in the most efficient manner. What should you do?

Options:

A.

In the Admin console sharing settings, select the finance organizational unit and deselect Allow users outside the domain to access files in shared drives

B.

Assign the Shared Drive to the finance organizational unit

C.

Create a new DLP policy for shared drive users

D.

Change the scope of the policy to apply to all in the domain

Question 26

Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What steps should you take from the admin panel to preventusers from copying data from work to personal apps on iOS devices? (Choose Two)

Options:

A.

Clear the "allow users to copy data to personal apps" checkbox.

B.

Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Data Protection

C.

Turn on "Advanced Mobile Management."

D.

Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Open Docs in Unmanaged Apps

E.

Clear the "allow items created with managed apps to open in unmanaged apps" checkbox.

Question 27

The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified

as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue.

What two actions should you take? (Choose two.)

Options:

A.

Obtain the message header and analyze using Google Workspace Toolbox.

B.

Review the contents of the messages in Google Vault.

C.

Set up a Gmail routing rule to whitelist the sender.

D.

Conduct an Email log search to trace the message route.

E.

Validate that your domain is not on the Spamhaus blacklist.

Question 28

A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam. What steps should the admin take to prevent this behavior in the future?

Options:

A.

Modify the SPF record for your internal domain to include the IPs of the external user's mail servers.

B.

Update the spam settings in the Admin Console to be less aggressive.

C.

Add the sender's domain to an allowlist via approved senders in the Admin Console.

D.

Instruct the user to add the senders to their contacts.

Question 29

After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff.

What should you do?

Options:

A.

Create a custom Apps Script to reset passwords.

B.

Use a third-party tool for password recovery.

C.

Enable non-admin password recovery.

D.

Create a Google form to submit reset requests.

Question 30

Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook. How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?

Options:

A.

Allow external sharing with the auditor using the ‘Trusted Domains’ feature.

B.

Enable the ‘Visitor Sharing’ feature, and demonstrate it to the Finance team.

C.

Use the ‘Publish’ feature in the Sheets editor to share the contents externally.

D.

Attach the Sheet file to an email message, and send to the external auditor.

Question 31

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.

What two actions should you take? (Choose two.)

Options:

A.

Configure objectionable content to reject messages with the words “wire transfer.”

B.

Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.

C.

Create a rule requiring secure transport for all messages regarding wire transfers.

D.

Add the sender of the wire transfer email to the blocked senders list.

E.

Enable all admin settings in Gmail's safety > spoofing and authentication.

Question 32

What steps does an administrator need to take to enforce TLS with a particular domain?

Options:

A.

Enable email safety features with the receiving domain.

B.

Set up secure transport compliance with the receiving domain.

C.

Configure an alternate secure route with the receiving domain.

D.

Set up DKIM authentication with the receiving domain.

Question 33

How can you monitor increases in user reported Spam as identified by Google?

Options:

A.

Review post-delivery activity in the Email logs.

B.

Review user-reported spam in the Investigation Tool.

C.

Review spike in user-reported spam in the Alert center.

D.

Rev]Biw post-delivery activity in the BigQuery Export.

Question 34

An employee has been leaking confidential salary information to an external party. You must use Vault to preserve the messages for an investigation. What should you do?

Options:

A.

Create a matter and add a hold on the employee's email

B.

Use the security investigation tool to find the messages Create a hold to preserve the messages

C.

Create a custom retention policy Use the audit feature to view captured email logs

D.

Use the search and export features to find all the messages sent externally

Question 35

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

Options:

A.

Extend the legal hold on the user's email data.

B.

Move project files to a Team Drive or transfer ownership.

C.

Rename the account to the new user starting next week.

D.

Delete the account, freeing up a Google Workspace License.

E.

Assign the terminated user account an Archive User license.

Question 36

Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in Google Workspace Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error.

What should you do?

Options:

A.

Install Google Cloud Directory Sync on all Domain Controllers.

B.

Install Google Workspace Sync for Microsoft Outlook on all employees’ computers.

C.

Install Google Cloud Directory Sync on a supported server.

D.

Install Google Apps Manager to automate add-user scripts.

Question 37

Multiple users across the organization are experiencing video degradation in Meet video calls. As an administrator, what steps should you take to start troubleshooting?

Options:

A.

Troubleshoot network bandwidth for the organizer of the meeting.

B.

Push the Meet quality tool to end user devices and run local reports to determine connectivity issues.

C.

Locate the Meet quality tool, and review the output for issues with quality.

D.

Update the Admin Console Meet settings to disable streaming.

Question 38

After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.

What should you do?

Options:

A.

Add the legal team to the User Management Admin system role.

B.

Add the legal team to the Google Vault Google Group.

C.

Create a custom role with Google Vault access, and add the legal team.

D.

Create a matter in Google Vault, and share with the legal team.

Question 39

Four weeks ago. you exported data from Google Vault and emailed the PST export file to your legal admin. They accidentally deleted the PST file and need it sent again. What steps should you take to re-send the PST file to the legal admin?

Options:

A.

Return to the Google Vault export page, and download the ZIP file again.

B.

Return to the Email Log Search page, and download the PST file again.

C.

Ask the legal admin to return to Google Vault to download the PST file again.

D.

Repeat the original search for the original timeframe, and export the data again.

Question 40

Your organization has offices in Canada Italy and the United States You want to ensure that employees can access corporate Gmail and Drive from these three geographic locations only What should you do?

Options:

A.

Require the use of corporate devices for any access to corporate Gmail and Drive

B.

Use context-aware access to create access levels based on the geographic location and assign them to corporate Gmail and Drive

C.

Create address lists to restrict the delivery of incoming and outgoing messages and to block notifications from Google Doc comments

D.

Create data protection rules in Google Workspace that allow data access from only three geographic locations

Question 41

Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)

Options:

A.

Provide your current GCDS instance with admin credentials to the recently acquired organization's LDAP directory.

B.

Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.

C.

Set up exclusion rules to ensure that users synced from the acquired organization's LDAP are not, suspended.

D.

Set up an additional instance of GCDS running on another server, and handle the acquired organization's synchronization.

E.

Upgrade to the multiple LDAP version of GCDS.

Question 42

Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.

What should you do?

Options:

A.

Use the conflict account remove tool to remove the accounts from Google Workspace.

B.

Rename the accounts to temp@your-company.com, and recreate the accounts.

C.

Ask users to request a new Google Workspace account from your local admin.

D.

Use the Transfer tool for unmanaged users to find the conflict accounts.

Question 43

Your company policy requires that managers be provided access to Drive data once an employee leaves the company.

How should you grant this access?

Options:

A.

Make the manager a delegate to the former employee's account.

B.

Copy the data from the former employee’s My Drive to the manager's My Drive.

C.

Transfer ownership of all Drive data using the file transfer ownership tool in the Google Workspace Admin console.

D.

Login as the user and add the manager to the file permissions using the “Is owner’ privilege for all Drive files.

Question 44

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace.

What should you do?

Options:

A.

Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.

B.

In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.

C.

Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.

D.

Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.

Question 45

An employee at your organization is resigning They are in charge of organizing and maintaining recurring team events You want to preserve the existing meetings and transfer ownership to the resigning employee's manager What should you do?

Options:

A.

Assign an Archived User (AU) license for the resigning employee

B.

Delete the existing calendar events and instruct the manager to create new events as the owner

C.

Instruct the resigning employee to share free busy details for their calendar with their manager

D.

Transfer both the events and the resources owned by the resigning employee to their manager by using the Admin console

Question 46

Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration.

Which scenario could require an alternative deployment strategy?

Options:

A.

Some of your Active Directory groups have sensitive group membership.

B.

Some of the Active Directory groups do not have owners.

C.

Some of the Active Directory groups have members external to organization.

D.

Some of the Active Directory groups do not have email addresses.

Question 47

Your global marketing team has over 500 employees. They recently started working with Google Analytics and want to move to managed accounts You decide to use Google Cloud Directory Sync (GCDS) to sync users from your current identity provider Your organization currently has no Google Workspace licenses linked to the Admin console You run GCDS for the first lime and receive the following error. "Domain user limit reached " You need to identify and fix the problem What should you do?

Options:

A.

Ensure that there is a subscription available and enough licenses to sync the new users

B.

Check if GCDS has the correct permissions to run a sync on your domain

C.

Wait 48 hours until the domain is fully provisioned

D.

Update the delete limits of GCDS and try again

Question 48

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.

What should you do?

Options:

A.

Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.

B.

Change Enrollment Controls to Place Chrome device in user organization.

C.

Change Enrollment Controls to Keep Chrome device in current location.

D.

Change Enrolment Permissions to not allow users in this organization to enroll new devices.

Question 49

The application development team has come to you requesting that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app.

What should you do?

Options:

A.

Enable all API access for Google Drive.

B.

Enable “trust domain owned apps” setting.

C.

Add OAuth Client ID to Google Drive Trusted List.

D.

Whitelist the app in the Google Workspace Marketplace.

Question 50

You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no other users are experiencing issues signing in. What could be causing the sign-in issue?

Options:

A.

The SAML assertion provided by the third-party IDP is presenting a username that conflicts with the current username configured in Google Workspace.

B.

The user's Google password was changed administratively, which is causing a sign-in failure.

C.

The issued certificate for that user has been revoked and must be updated before the user can have another successful sign in.

D.

The SAML assertion is providing the user's previous password attached to their old username.

Question 51

You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.

Which configuration should you implement?

Options:

A.

Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.

B.

Provision accounts within your domain for the external users, and turn off external sharing for that Org.

C.

Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.

D.

Create a Team Drive for this engagement, and limit the memberships and sharing settings.

Question 52

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available.

What should you do?

Options:

A.

Set up unmanaged Chromeboxes and set the executives’ homepage to meet.google.com via Chrome settings.

B.

Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.

C.

Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives’ calendars.

D.

Provision managed Chromeboxes and set the executives’ Chrome homepage to meet. google.com via device policy.

Question 53

Your default Vault retention policy for Gmail is set to 365 days Your legal department has just informed you that emails sent and received by the customer support department are sensitive and must be retained for only 30 days You must enforce this new retention policy in the simplest way What should you do?

Options:

A.

Change the current default retention policy in Vault for Gmail to 30 days and apply it to the customer support organizational unit (OU) Configure a custom retention policy for Gmail for 365 days for your domain

B.

Create two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

C.

Change the current default retention policy for Gmail to 30 days Configure two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

D.

Create a custom retention policy in Vault for Gmail for 30 days and apply it to the customer support organizational unit (OU)

Question 54

Several users in your organization reported an issue with receiving emails from one particular external sender You want to troubleshoot the issue and determine whether Google received these emails What should you do?

Options:

A.

Check if your Google Workspace domain registration expired

B.

Search for missing email messages by using email Log Search {ELS) and determine why messages weren't delivered

C.

Update your MX records to make sure they point to Google mail servers

D.

Open a support ticket with Google Workspace Support

Question 55

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?

Options:

A.

Assign the pre-built security admin role to the security team members.

B.

Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.

C.

Assign the Super Admin Role to the security team members.

D.

Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.

Question 56

Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.

You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing. Which two solutions would help you mitigate the risk at minimal cost?

Choose 2 answers

Options:

A.

Deploy 2-Step Verification for all users who have security keys.

B.

Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.

C.

Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

D.

Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

E.

For all executives, create new accounts with random characters to match Google best practices, migrate

data from the former accounts, and then delete them.

Question 57

You work for an international organization and your CEO frequently travels to other countries You need to enable email access and configure the account for multiple administrative assistants What should you do?

Options:

A.

Log into the Gmail account of the CEO Set up and share two separate email aliases

B.

Enable users to specify what sender information is included in delegated messages sent from their account.

C.

Create a group of administrative assistants Enable delegated access to the mailbox of the CEO for that group

D.

Provide the executive administrative assistants with the account password of the CEO

Question 58

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?

What should you do?

Options:

A.

Create a report using the OAuth Token Audit Activity logs.

B.

Create a report using the Calendar Audit Activity logs.

C.

Create a report using the Drive Audit Activity logs.

D.

Create a reporting using the API Permissions logs for Installed Apps.

Question 59

Your organization is migrating to Google Workspace and wants to improve how newly created files are classified You must find a scalable solution to improve security and transparency on how to handle sensitive files What should you do?

Options:

A.

Set data loss prevention (DLP) policies to label data automatically disable label locking, and educate users

B.

Create classification labels enable automatic classification, and educate users

C.

Migrate data to Google Workspace map classifications and migrate with the Drive Labels API

D.

Integrate with the Cloud DLP API map identifiers and classifications install the Google Drive label client and run the application