Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

A.

Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.

B.

Set up email forwarding from your on-premises email provider to Gmail.

C.

Create a content compliance rule to filter and route incoming emails.

D.

Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.

Full Access
Question # 5

Your organization’s security team has published a list of vetted third-party apps and extensions that can be used by employees. All other apps are prohibited unless a business case is presented and approved. The Chrome Web Store policy applied at the top-level organization allows all apps and extensions with an admin blocklist. You need to disable any unapproved apps that have already been installed and prevent employees from installing unapproved apps. What should you do?

A.

Change the Chrome Web Store allow/block mode setting to allow all apps, admin manages blocklist, In the App access control card, block any existing web app that is not on the security team’s vetted list.

B.

Change the Chrome Web Store allow/block mode setting to block all apps, admin manages allowlist. Add the apps on the security team’s vetted list to the allowlist.

C.

Disable Extensions and Chrome packaged apps as Allowed types of apps and extensions for the top-level organizational unit. Selectively enable the appropriate extension types for each suborganization

D.

Disable the Chrome Web Store service for the top-level organizational unit. Enable the Chrome Web Store service for organizations that require Chrome apps and extensions.

Full Access
Question # 6

Your organization recently deployed Google Workspace. Over 3,000 external contacts were shared in public folders in Microsoft Exchange before the implementation. You need to ensure that these external contacts appear to domain users in Gmail. What should you do?

A.

Export the external contacts to a CSV file, upload the file to Google Drive, and instruct users to import to their My Contacts.

B.

Use Google Cloud Directory Sync to sync the external contacts from the public folders in Microsoft Exchange to the Directory.

C.

Use the Domain Shared Contacts API to add the external contacts to the Directory.

D.

Create a user account, add the external contacts, and delegate them to all users in the domain.

Full Access
Question # 7

You need to ensure that data owned by former employees remains available in Google Vault. You want to use the most cost-effective solution.

What should you do?

A.

Migrate the former employees’ Gmail to their manager(s) by using the data migration service during the deletion process. Transfer the former employees’ Google Drive files to a new owner.

B.

Change the Google account passwords of the former employees.

C.

Suspend the former employees’ Google accounts. Create an organizational unit (OU). Move the former employees into that OU.

D.

Assign an Archived User license to the former employees’ Google accounts.

Full Access
Question # 8

Your organization collects credit card information in customer files. You need to implement a policy for your organization’s Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?

A.

Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to “block external sharing”, and enables the “Log event” option.

B.

Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.

C.

Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.

D.

Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.

Full Access
Question # 9

The innovation team at your organization has a dedicated room with prototype equipment. You need to make the room bookable, add the equipment, and ensure that there are no booking conflicts. Only the innovation team and the sales directors can access this room. What should you do?

A.

Create a separate Google Calendar resource for the room. Manually manage booking requests from both teams.

B.

Create a Google Group for the innovation team and another Google Group for sales directors. Share the room's calendar with both groups.

C.

Create a Google Calendar event for the room. Share the event with the innovation team and sales directors.

D.

Edit the Google Calendar settings for the room resource. Adjust the permission settings so only the innovation team and sales director group can view and book time on this calendar.

Full Access
Question # 10

Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?

A.

Configure the Drive sharing options for the domain to internal only.

B.

Restrict the Drive sharingoptions for the domain to allowlisted domains.

C.

Create a Drive DLP rule, and use the sensitive internal Project name as the detector.

D.

Turn off the Drive sharing setting from the Team dashboard.

Full Access
Question # 11

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

A.

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.

Enable Protect against unauthenticated emails in Gmail Safety.

D.

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Full Access
Question # 12

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external Google Groups with their Google Workspace accounts without interrupting internal group usage. What should you do?

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.

B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.

C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.

D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.

Full Access
Question # 13

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee’s documents for the manager and the team.

You want to minimize license cost. What should you do?

A.

Delete the former employee's Workspace account.

B.

Suspend former employee's Workspace account.

C.

Reset the password of the former employee and keep their Workspace license active.

D.

Switch the license type of the former employee's Workspace account to an Archived User license.

Full Access
Question # 14

You are onboarding a new employee who will use a company-provided Android device. Your company requires the ability to enforce strong security policies on mobile devices, including password complexity requirements and remote device wipe capabilities. You need to choose the appropriate Google Workspace mobile device management solution. What should you do?

A.

Use a third-party mobile device management (MDM) solution to manage the device.

B.

Allow the employee to use their personal device without enrolling it in any mobile device management (MDM) solution.

C.

Implement Google’s basic management solution for the mobile device.

D.

Implement Google’s advanced management solution for the mobile device.

Full Access
Question # 15

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

Full Access
Question # 16

Your organization needs an approval application for purchases where a user can enter information on the purchase required and then submit it for management approval. You need to suggest a solution to create the application that must be available on both the web and mobile devices. Your organization does not have software developers or the budget to hire a third party. What should you do?

A.

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

B.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

C.

Suggest the organization use AppSheet to create the application.

D.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

Full Access
Question # 17

Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?

A.

Run the Transfer tool to bring unmanaged users to your Workspace account.

B.

Check domain ownership in the DNS settings.

C.

Wait 24 hours after signing up for the features to become active.

D.

Upgrade to a Google Workspace Enterprise edition.

Full Access
Question # 18

Your organization allows employees to use their personal devices for work purposes. You want to ensure these devices follow the company’s security policies. You need to choose a mobile management solution that provides minimal passcode enforcement and allows for an admin to remotely wipe a user’s account from the device. You also want to avoid having to install agents on employees’ personal devices. What should you do?

A.

Implement Google’s advanced management on mobile devices.

B.

Implement Google’s basic management on mobile devices.

C.

Enforce a strong password policy, and enforce the password policy at the next sign-in.

D.

Deploy a third-party mobile device management (MDM) solution.

Full Access
Question # 19

Your company provides shared Chromebook workstations for employees to access sensitive company data. You must configure the devices to ensure no sensitive data is stored locally and that browsing data is cleared after each use. What should you do?

A.

Force ephemeral mode in Chrome. Disable offline access for sensitive Workspace apps like Docs, Sheets, and Drive.

B.

Enable the Manage Guest Session functionality, and set the maximum user session length.

C.

Force ephemeral mode in Chrome. Allow offline access for all Workspace apps with strict expiration times.

D.

Disable offline access for all Workspace apps. Enable incognito mode for Chrome browsing sessions.

Full Access
Question # 20

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Full Access
Question # 21

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Full Access