Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Your organization’s security team has published a list of vetted third-party apps and extensions that can be used by employees. All other apps are prohibited unless a business case is presented and approved. The Chrome Web Store policy applied at the top-level organization allows all apps and extensions with an admin blocklist. You need to disable any unapproved apps that have already been installed and prevent employees from installing unapproved apps. What should you do?

A.

Change the Chrome Web Store allow/block mode setting to allow all apps, admin manages blocklist, In the App access control card, block any existing web app that is not on the security team’s vetted list.

B.

Change the Chrome Web Store allow/block mode setting to block all apps, admin manages allowlist. Add the apps on the security team’s vetted list to the allowlist.

C.

Disable Extensions and Chrome packaged apps as Allowed types of apps and extensions for the top-level organizational unit. Selectively enable the appropriate extension types for each suborganization

D.

Disable the Chrome Web Store service for the top-level organizational unit. Enable the Chrome Web Store service for organizations that require Chrome apps and extensions.

Full Access
Question # 5

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Full Access
Question # 6

Your company wants to enable single sign-on (SSO) for its employees to access a newly acquired cloud-based marketing platform. The marketing platform vendor has confirmed SAML 2.0 compatibility and provided the necessary metadata. You need to streamline user access and centralize authentication through Google Workspace. What should you do?

A.

Request an API key from the marketing platform vendor for SAML integration.

B.

Enable two-factor authentication for all users to enhance security before implementing SSO.

C.

Instruct employees to log in to the marketing platform using the Sign In with Google functionality.

D.

Create a new SAML application in the Google Admin console.

Full Access
Question # 7

Your company has a globally distributed remote work team. You want to ensure all team members adhere to the company's data security policies and only access authorized systems based on their location and role. What should you do?

A.

Create and enforce data loss prevention (DLP) rules to control data sharing.

B.

Set up and mandate the use of a company-wide VPN for all remote access.

C.

Implement two-factor authentication for all remote team members.

D.

Configure access control policies with conditional access.

Full Access
Question # 8

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Full Access
Question # 9

Your company provides shared Chromebook workstations for employees to access sensitive company data. You must configure the devices to ensure no sensitive data is stored locally and that browsing data is cleared after each use. What should you do?

A.

Force ephemeral mode in Chrome. Disable offline access for sensitive Workspace apps like Docs, Sheets, and Drive.

B.

Enable the Manage Guest Session functionality, and set the maximum user session length.

C.

Force ephemeral mode in Chrome. Allow offline access for all Workspace apps with strict expiration times.

D.

Disable offline access for all Workspace apps. Enable incognito mode for Chrome browsing sessions.

Full Access
Question # 10

Your organization handles a significant amount of sensitive customer data and must follow strict industry regulations. To meet an upcoming compliance deadline, you need to quickly implement a solution that automatically classifies files stored in Google Drive based on the content of files.

What should you do?

A.

Create data loss prevention (DLP) rules for Drive. Configure the rules to apply Drive labels based on content.

B.

Apply Drive labels based on content. Use Google Vault to create retention rules based on Drive labels, ensuring that data is kept for the required duration.

C.

Implement a third-party data governance tool that integrates with Drive and provides advanced classification capabilities.

D.

Add users into organizational units (OUs). Configure default file classification in Drive for the desired OUs.

Full Access
Question # 11

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Full Access
Question # 12

You are applying device and user policies for employees in your organization who are in different departments. You need each department to have a different set of policies. You want to follow Google-recommended practices. What should you do?

A.

Create separate top-level organizational units for each department.

B.

Create an Access group for each department. Configure the applicable policies.

C.

Add all managed users and devices in the top-level organizational unit.

D.

Create a child organizational unit for each department.

Full Access
Question # 13

A user in your organization reported that their internal event recipient is not receiving the Calendar event invites. You need to identify the source of this problem. What should you do?

A.

Check whether the business hours are set up in the event recipient's Calendar settings.

B.

Check if Calendar service is turned off for the event creator.

C.

Check whether the Calendar event has more than 50 guests.

D.

Check whether the event recipient has turned off their email notifications for new events in their Calendar settings.

Full Access
Question # 14

Your company's sales team writes many business proposals in Google Docs. They want to streamline the proposal process by using templates. You need to create a document template with pre-populated sections that the sales team can access. What should you do?

A.

Create the templates in Google Drive. Grant edit access to the sales team.

B.

Create the templates in Google Drive. Make a copy for each sales representative. Transfer ownership of each template to the sales representatives.

C.

Enable organization branding in the Admin console. Create the templates in Google Drive. Add the templates to default themes and templates for the entire organization.

D.

Create the templates in Google Drive and download the files as PDFs. Upload PDF files to a drive shared with your sales team.

Full Access
Question # 15

You notice an increase in support cases related to Chrome browser within your organization. You suspect a potential outage or service disruption with Chrome browser. You need to determine whether any information has been released about the issue and if there are any projected timelines for its resolution. What should you do first?

A.

Use the Help Assistant within the Google Admin console to identify if there was a recent outage.

B.

Collect a HAR file, and use the Google Admin Toolbox to identify potential failures.

C.

Review the Google Workspace Status Dashboard.

D.

Log a case with Chrome Enterprise support.

Full Access
Question # 16

Your company has just started using Search Ads 360. You need to limit access to Additional Google services for your entire organization by using the Admin console. Only the marketing team and a specific group of users from the web design team should have access. What should you do?

A.

Enable Search Ads 360 for both the marketing and web design team organizational units (OUs). Create a group to explicitly deny access to Search Ads 360. Assign the group to the web design users who should not have access.

B.

Enable Search Ads 360 at the top level of your organizational structure.

C.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a sub-OU under the marketing OU. and move the web design team users who need access into this sub-OU.

D.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a new group in the Admin console that includes the web design team users who need access. Enable Search Ads 360 for that group.

Full Access
Question # 17

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Full Access
Question # 18

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

A.

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.

Upload the HAR file to Google Drive and share the file with the Google support representative.

Full Access
Question # 19

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Full Access
Question # 20

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?

A.

Create and enforce a new password policy for all users in your organization.

B.

Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.

C.

Create an activity rule that is triggered by the User’s password changed event. Add compliance team members as email recipients.

D.

Create a new alert by using user log events. Check that the challenge type is “Password”, and add the compliance team as email recipients.

Full Access
Question # 21

Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?

A.

Create a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.

B.

Create a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.

C.

Create a Google Group and update the settings to allow anyone in the organization to join the group.

D.

Create a Google Group and appoint a group admin to manage the membership of this group.

Full Access
Question # 22

Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.

You need to enforce the new password policy in Google Workspace. What should you do?

A.

Share the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.

B.

Enable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.

C.

Create a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.

D.

Create a password policy in Active Directory. Enable password synchronization in GCDS.

Full Access
Question # 23

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Full Access
Question # 24

During a recent Google Meet video conference, several employees reported that they could not hear the presenters. The presenters confirmed that their laptops’ microphones were working. The affected employees were all using company-issued laptops. You need to quickly diagnose the source of the issue. What should you do first?

A.

Verify that the audio drivers on the affected laptops are up-to-date and functioning correctly.

B.

Check the Admin console to determine whether there are recent Meet-related notifications or alerts.

C.

Check if Context-Aware access rules were set to prevent Meet access from the user’s network location.

D.

Use the Meet quality tool for each affected user to analyze their microphone settings and configurations during the meeting.

Full Access
Question # 25

A department at your company wants access to the latest AI-powered features in Google Workspace. You know that Gemini offers advanced capabilities and you need to provide the department with immediate access to Gemini’s features while retaining control over its deployment to ensure that corporate data is not available for human review. What should you do?

A.

Enable Gemini for the department’s organizational unit and assign Gemini licenses to users in the department.

B.

Monitor Gemini adoption through the administrator console and wait for wider user adoption before assigning licenses.

C.

Enable Gemini for non-licensed users in that department so they have immediate access to the free service.

D.

Enable Alpha features for the organization and assign Gemini licenses to all users.  

Full Access
Question # 26

Your organization allows employees to use their personal mobile devices to check their work emails. You need to remove the employee’s work email data from their phone when they leave the organization. What should you do?

A.

Set up basic mobile management on the devices.

B.

Set up advanced mobile management on the devices.

C.

Set up data protection rules to prevent data sharing externally.

D.

Set up 2SV authentication on the devices.

Full Access
Question # 27

Your company operates several primary care clinics where employees routinely work with protected health information (PHI). You are in the process of transitioning the organization to Google Workspace from a legacy communication and collaboration system. After you sign the Business Associate Agreement (BAA), you need to ensure that data is handled in compliance with regulations when using Google Workspace. What should you do?

A.

Implement a third-party backup service that is also compliant with Google Workspace core services.

B.

Create a label for Google Drive content to help employees identify sensitive data.

C.

Instruct the staff to not store any PHI in Google Workspace core services, including Google Drive. Docs. Sheets, and Keep.

D.

Disable integrations with third-party apps and turn off non-core Google services.

Full Access