Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Google Google-Workspace-Administrator Associate Google Workspace Administrator Exam Practice Test

Associate Google Workspace Administrator Questions and Answers

Question 1

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Options:

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Question 2

Your organization is concerned about unauthorized access attempts. You want to implement a security measure that makes users change their password if there are twenty or more failed login attempts within one hour. You want to use the most effective and efficient approach. What should you do?

Options:

A.

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.

B.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.

C.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.

D.

Enable email alerts to notify users that they need to change their password.

Question 3

Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?

Options:

A.

End all unsupervised meetings by using the Google Meet APIs.

B.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.

C.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.

D.

Identify and end all unsupervised meetings by using the security investigation tool.

Question 4

You manage Chrome Enterprise browsers for your large organization. You want to ensure that specific extensions are automatically installed on all managed Chrome Enterprise browsers. What should you do?

Options:

A.

Allowlist the specific Chrome browser extensions.

B.

Configure a script to deploy the extensions upon user login.

C.

Publish the extensions in the Chrome Web Store.

D.

Force-install the extensions through Chrome browser policies.

Question 5

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

Options:

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Question 6

Your company wants to enable single sign-on (SSO) for its employees to access a newly acquired cloud-based marketing platform. The marketing platform vendor has confirmed SAML 2.0 compatibility and provided the necessary metadata. You need to streamline user access and centralize authentication through Google Workspace. What should you do?

Options:

A.

Request an API key from the marketing platform vendor for SAML integration.

B.

Enable two-factor authentication for all users to enhance security before implementing SSO.

C.

Instruct employees to log in to the marketing platform using the Sign In with Google functionality.

D.

Create a new SAML application in the Google Admin console.

Question 7

Your organization wants to prevent a group of users from logging into their Google Drive when they are traveling internationally for business.

You have added these users to an organizational unit (OU). You need to secure the users’ access to the Google Drive app to meet this requirement.

What should you do?

Options:

A.

Disable Google Drive for users in the OU.

B.

Define location-based access levels. Assign the levels to the Google Drive app for the OU.

C.

Require 2-step verification (2SV) when users in the OU sign in.

D.

Define user-based access levels. Assign the levels to the Google Drive app for the OU.

Question 8

Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?

Options:

A.

Configure the Drive sharing options for the domain to internal only.

B.

Restrict the Drive sharingoptions for the domain to allowlisted domains.

C.

Create a Drive DLP rule, and use the sensitive internal Project name as the detector.

D.

Turn off the Drive sharing setting from the Team dashboard.

Question 9

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

Options:

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Question 10

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Question 11

An employee is leaving your company and has numerous files stored in My Drive. Their manager wants to retain access to these files. You need to offboard the departing employee’s Google Workspace account while ensuring that the manager can still access the files while following Google-recommended practices. What should you do?

Options:

A.

Use Google Vault to establish a retention policy for the organizational unit (OU) of the departing employee. Assign the Google Archived User license.

B.

Instruct the departing employee to share their My Drive folder with the manager before leaving. Delete the Google Workspace account on the departing employee’s last day.

C.

Download the departing employee’s Drive data by using Google Takeout. Upload the data to the manager’s Drive before deleting the departing employee’s Google Workspace account.

D.

Transfer ownership of the departing employee’s files to the manager during the user deletion process.

Question 12

An end user has thousands of files stored in Google Drive. Their files are well organized with Drive labels. You need to advise the end user on how to quickly identify all files that are contracts. What should you do?

Options:

A.

Advise the user to use the Google Drive API to search for files with the keyword "contracts'

B.

Advise the user to search in Drive for files with the keyword "contracts', and use the "modified by me' filter.

C.

Advise the user to search for files that are labeled as "contracts'.

D.

Advise the user to use the Investigation tool to search for files with the keyword "contracts' and updated by you.

Question 13

External sharing at your company is only permitted for the sales and marketing department. Engineering is not allowed to share externally. You need to configure the sharing settings to comply with this policy. What should you do?

Options:

A.

Use a data loss prevention (DLP) solution to control external sharing based on user groups.

B.

Create separate shared drives for each department with different external sharing settings.

C.

Create organizational units (OUs) for each department. Configure different external sharing settings for each OU.

D.

Configure Drive trust rules to restrict the engineering department from sharing externally.

Question 14

Your organization collects credit card information in customer files. You need to implement a policy for your organization’s Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?

Options:

A.

Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to “block external sharing”, and enables the “Log event” option.

B.

Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.

C.

Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.

D.

Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.

Question 15

Per regulatory requirements, your company is required to keep the data of employees located in Germany within Europe and the data of employees located in the US within the US. The employees in Germany are in a separate organizational unit (OU) than employees in the US. You need to ensure that where employee data is stored is in compliance with the location regulations.

What should you do?

Options:

A.

Instruct employees to use Drive for desktop to keep documents on their corporate computers.

B.

Create two Groups. Assign employees into the Germany or US Group based on their location. Use Google Drive trust rules to prevent sharing between the Groups.

C.

Navigate to the Data Regions function in the Admin console. Select the Europe region for employees in Germany, and select the US region for US employees.

D.

Navigate to the Data Regions function in the Admin console. Select 'No preference.'

Question 16

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

Options:

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

Question 17

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

Options:

A.

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.

Upload the HAR file to Google Drive and share the file with the Google support representative.

Question 18

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

Options:

A.

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.

Enable Protect against unauthenticated emails in Gmail Safety.

D.

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Question 19

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

Options:

A.

Conduct a Vault search to find this email and identify if additional users were affected.

B.

Conduct a search to find all emails sent by the sender by usingthe Gmail API.

C.

Conduct an Email reports search to find this email and all of the email's recipients.

D.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Question 20

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

Options:

A.

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.

B.

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.

C.

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.

D.

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.

Question 21

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

Options:

A.

Assign the trusted employees as moderators for the relevant Chat spaces.

B.

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared

C.

Use the security investigation tool to audit and monitor Chat messages.

D.

Disable all Chat spaces except those specifically approved by management.