New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

By using Account Activity reports, you have flagged several users who are uploading large files. You want to ensure you don't run out of pooled storage and you want to stop the abuse. What should you do first?

A.

Email flagged users with a warning of possible abuse.

B.

Place the flagged users in a configuration group and set storage limits for the group.

C.

Use the Security Investigation Tool to set alerts on the flagged users.

D.

Warn the flagged users, and purchase more pooled storage to avoid hitting storage quotas.

Full Access
Question # 5

Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.

What should you do?

A.

Enable additional security verification via email.

B.

Enable authentication via the Google Authenticator.

C.

Deploy browser or device certificates via Google Workspace.

D.

Configure USB Yubikeys for all users.

Full Access
Question # 6

Your organization's information security team has asked you to determine and remediate if a user (user1@example.com) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?

A.

Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is user1@example.com.

B.

Have the super administrator use the Security API to audit Drive access.

C.

As a super administrator, change the access on externally shared Drive files manually under user1@example.com.

D.

Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for user1@example.com.

Full Access
Question # 7

A user named Alice is leaving your organization You need to transfer all of Alice's data from her Drive to Bob's Drive in the most simple and efficient manner possible What should you do?

A.

Use the Google Admin console to move the files from Alice's Drive to Bob's Drive

B.

Use the Google Takeout service to export Alice's data to a zip file and instruct Bob to import the zip file into his Drive

C.

Use the Google Drive API to programmatically transfer the files from Alice's Drive to Bob's Drive

D.

Instruct Alice to download all of her files from her Drive and upload them to Bob's Drive

Full Access
Question # 8

Your organization wants to grant Google Vault access to an external regulatory authority. In an effort to comply with an investigation, the external group needs the ability to view reports in Google Vault. What should you do?

A.

Create accounts for external users and assign Vault privileges.

B.

Share Vault access with external users.

C.

Assign an Archived User license to the external users.

D.

Temporarily assign the super admin role to the users

Full Access
Question # 9

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?

A.

Delete the user's account in the Admin Console.

B.

Transfer data between end user Workspace accounts.

C.

Instruct a Google Vault admin to create a matter, and place all the user data on ‘hold.’

D.

Use Google Vault to export all the user data and share among the security team.

Full Access
Question # 10

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.

What should you do?

A.

Run the Transfer Tool for Unmanaged users.

B.

Use a Google Form to survey the Marketing department users.

C.

Assure the VP that there is no action required to configure Google Workspace.

D.

Contact Google Enterprise Support to identify affected users.

Full Access
Question # 11

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.” You are responsible for making sure that users cannot remove the footer.

What should you do?

A.

Send an email to each sales person with the instructions on how to add the footer to their Signature.

B.

Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.

C.

Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.

D.

Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.

Full Access
Question # 12

A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam. What steps should the admin take to prevent this behavior in the future?

A.

Modify the SPF record for your internal domain to include the IPs of the external user's mail servers.

B.

Update the spam settings in the Admin Console to be less aggressive.

C.

Add the sender's domain to an allowlist via approved senders in the Admin Console.

D.

Instruct the user to add the senders to their contacts.

Full Access
Question # 13

You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.

Which configuration should you implement?

A.

Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.

B.

Provision accounts within your domain for the external users, and turn off external sharing for that Org.

C.

Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.

D.

Create a Team Drive for this engagement, and limit the memberships and sharing settings.

Full Access
Question # 14

Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.

What are two ways you should accomplish this? (Choose two.)

A.

Use the Data Export Tool to export admin audit data to your existing SIEM system

B.

Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.

C.

Use Apps Script and the Reports API to export drive audit data to the existing SIEM system

D.

Use the BigQuery export to send admin audit data to the existing SIEM system via custom code

E.

Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.

Full Access
Question # 15

You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly.

What should you do?

A.

Use the bulk upload with CSV feature in the Google Workspace Admin panel to update all Groups.

B.

Update your configuration file and resync mailing lists with Google Cloud Directory Sync.

C.

Create and assign a custom admin role for all group owners so they can update settings.

D.

Use the Groups Settings API to update Google Groups with desired settings.

Full Access
Question # 16

Your organization has offices in Canada Italy and the United States You want to ensure that employees can access corporate Gmail and Drive from these three geographic locations only What should you do?

A.

Require the use of corporate devices for any access to corporate Gmail and Drive

B.

Use context-aware access to create access levels based on the geographic location and assign them to corporate Gmail and Drive

C.

Create address lists to restrict the delivery of incoming and outgoing messages and to block notifications from Google Doc comments

D.

Create data protection rules in Google Workspace that allow data access from only three geographic locations

Full Access
Question # 17

Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information.

What should you do?

A.

Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.

B.

Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.

C.

Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

D.

Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

Full Access
Question # 18

Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

A.

Use the login audit report to export all suspicious login details for analysis.

B.

Create a custom dashboard with the security investigation tool showing suspicious logins.

C.

Use the account activity report to export all suspicious login details for analysis.

D.

Create a custom query in BigQuery showing all suspicious login details.

Full Access
Question # 19

An employee at your organization is resigning They are in charge of organizing and maintaining recurring team events You want to preserve the existing meetings and transfer ownership to the resigning employee's manager What should you do?

A.

Assign an Archived User (AU) license for the resigning employee

B.

Delete the existing calendar events and instruct the manager to create new events as the owner

C.

Instruct the resigning employee to share free busy details for their calendar with their manager

D.

Transfer both the events and the resources owned by the resigning employee to their manager by using the Admin console

Full Access
Question # 20

Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)

A.

Provide your current GCDS instance with admin credentials to the recently acquired organization's LDAP directory.

B.

Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.

C.

Set up exclusion rules to ensure that users synced from the acquired organization's LDAP are not, suspended.

D.

Set up an additional instance of GCDS running on another server, and handle the acquired organization's synchronization.

E.

Upgrade to the multiple LDAP version of GCDS.

Full Access
Question # 21

Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app.

What should you do?

A.

For the Finance OU, enable the third-party app in SAML apps.

B.

For the Finance OU, enable the third-party app in Marketplace Apps.

C.

At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.

D.

At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.

Full Access
Question # 22

As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore from one satellite office and that they receive an error message that “a company policy is blocking access to this app.” The users have no issue with Gmail or Google Calendar. While investigating, you learn that both this office's Internet Service Provider (ISP) and the global IP address when accessing the internet were changed over the weekend. What is the most logical reason for this issue?

A.

An access level was defined based on the IP range and applied to Google Drive via Context-Aware Access.

B.

Under Drive and Docs > Sharing Settings, the “Whitelisted domains” list needs to be updated to add the new ISP domain.

C.

The Network Mask defined in Security > Settings > SSO with 3rd Party IdPs should be updated to reflect the new IP range.

D.

You need to raise a ticket to Google Cloud Support to have your new IP ranges registered for Drive API access.

Full Access
Question # 23

User A is a Basic License holder. User B is a Business License holder. These two users, along with many additional users, are in the same organizational unit at the same company. When User A attempts to access Drive, they receive the following error: “We are sorry, but you do not have access to Google Docs Editors. Please contact your Organization Administrator for access.” User B is not presented with the same error and accesses the service without issues.

How do you provide access to Drive for User A?

A.

Select User A in the Directory, and under the Apps section, check whether Drive and Docs is disabled. If so, enable it in the User record.

B.

In Apps > Google Workspace > Drive and Docs, select the organizational unit the users are in and enable Drive for the organizational unit.

C.

In Apps > Google Workspace, determine the Group that has Drive and Docs enabled as a service. Add User A to this group.

D.

Select User A in the Directory, and under the Licenses section, change their license from Basic to Business to add the Drive and Docs service.

Full Access
Question # 24

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?

A.

Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.

B.

Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.

C.

Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.

D.

Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.

Full Access
Question # 25

Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled.

What two actions should you take to support the chief security officer's request? (Choose two.)

A.

Review who has viewed files using the Google Drive Activity Dashboard.

B.

Create an alert from Drive Audit reports to notify of external file sharing.

C.

Review total external sharing in the Aggregate Reports section.

D.

Create a custom Dashboard for external sharing in the Security Investigation Tool.

E.

Automatically block external sharing using DLP rules.

Full Access
Question # 26

Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration.

Which scenario could require an alternative deployment strategy?

A.

Some of your Active Directory groups have sensitive group membership.

B.

Some of the Active Directory groups do not have owners.

C.

Some of the Active Directory groups have members external to organization.

D.

Some of the Active Directory groups do not have email addresses.

Full Access
Question # 27

As a Workspace Administrator you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?

A.

Download the company-owned inventory template CSV file from the Admin panel enter the serial number of the devices and upload the

B.

completed file to the company-owned inventory in the admin panel B O Download the company-owned inventory template CSV file from the Admin panel enter the device OSs. and serial numbers and upload the

C.

completed file to the company-owned inventory in the admin panel. C O Download the company-owned inventory template CSV file from the Admin panel enter the asset tags of the devices, and upload the

D.

completed file to the company-owned inventory in the admin panel D O Download the company-owned inventory template CSV file from the Admin panel, enter the device OSs. and asset tags, and upload the

Full Access
Question # 28

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?

A.

Assign the ‘Services Admin’ role to an administrator with ‘Super Admin’ privileges.

B.

Create a ‘Custom Role’ and add all the Google Vault privileges for a new administrator.

C.

Validate that the new administrator has access to Google Vault.

D.

Create a ‘Custom Role’ and add the ability to manage Google Vault matters, holds, searches, and exports.

Full Access
Question # 29

After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff.

What should you do?

A.

Create a custom Apps Script to reset passwords.

B.

Use a third-party tool for password recovery.

C.

Enable non-admin password recovery.

D.

Create a Google form to submit reset requests.

Full Access
Question # 30

Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, customercare@your-company.com to the cloud platform’s email address, your-company@cloudprovider.com. As a security measure, you have mail forwarding disabled at the domain level.

What should you do?

A.

Create a mail contact in the Google Workspace directory that has an email address of your- company@cloudprovider.com

B.

Create a rule to forward mail in the customercare@your-company.com mailbox to your- company@cloudprovider.com

C.

Create a recipient map in the Google Workspace Admin console that maps customercare@your-company.com to your-company@cloudprovider.com

D.

Create a content compliance rule in the Google Workspace Admin console to change route to your- company@cloudprovider.com

Full Access
Question # 31

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user’s data.

What two actions should you take? (Choose two.)

A.

Add the user's old email address to their account in the Google Workspace Admin panel.

B.

Change the user's primary email address in the Google Workspace Admin panel.

C.

Change the user's last name in the Google Workspace Admin panel.

D.

Change the user's primary email in Active Directory.

E.

Change the user's last name in Active Directory.

Full Access
Question # 32

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your- company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.

What steps should you take?

A.

Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.

B.

Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.

C.

Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.

D.

Set up a Default route with split delivery to route email to the on-premises server.

Full Access
Question # 33

You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no other users are experiencing issues signing in. What could be causing the sign-in issue?

A.

The SAML assertion provided by the third-party IDP is presenting a username that conflicts with the current username configured in Google Workspace.

B.

The user's Google password was changed administratively, which is causing a sign-in failure.

C.

The issued certificate for that user has been revoked and must be updated before the user can have another successful sign in.

D.

The SAML assertion is providing the user's previous password attached to their old username.

Full Access
Question # 34

The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?

A.

Configure a safety rule to protect against encrypted attachments from untrusted senders

B.

Configure a safety rule to protect against attachments with scripts from untrusted senders.

C.

In the security sandbox section, enable virtual execution of attachments for (he targeted OU

D.

In the security sandbox section, enable virtual execution of attachments for the entire organization.

Full Access
Question # 35

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

A.

Reinstall Password Sync on all domain controllers.

B.

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.

Confirm that the Password Sync service is running on all domain controllers.

D.

Reset the user's password in Active Directory.

Full Access
Question # 36

Your organization is moving from a legacy mail system to Google Workspace This move will happen in phases During the first phase, some of the users in the domain are set up to use a different identity provider (IdP) for logging in You need to set up multiple idPs for various users What should you do?

A.

Enable single sign-on (SSO) with third-party identity providers and exclude the users who are using a different provider

B.

Enable single sign-on (SSO) with Cloud Identity and use Cloud Directory Sync to manage multiple identity providers

C.

Create Security Assertion Markup Language (SAML) based single sign-on (SSO) profiles and assign them to specific organizational units or groups of users.

D.

Nothing Google uses cookies to establish a user's relationship to a device This will cover multiple identity providers

Full Access
Question # 37

Your organization is expected to start using Google Workspace Enterprise Standard in several countries. During the planning phase, the change management leadership team mandates that meeting rooms near each participant’s office location should be suggested when someone creates a Google Calendar event, to simplify the user experience and avoid booking rooms when people would not be able to move easily. What should you do?

A.

Organize users for each location in separate organizational units (OUs). Add room resources to the corresponding OUs so that meeting rooms would be suggested accordingly.

B.

Organize users for each location in separate Google Groups. Add room resources to the corresponding groups so that meeting rooms would be suggested accordingly.

C.

Share each room only with the Dynamic Group defined per each user location so that they can only book the rooms nearby.

D.

Define users' work locations by setting building ID. floor name, and floor section if applicable as the-buildings and rooms are defined.

Full Access
Question # 38

The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one is in violation of the new security policy.

What should you do?

A.

Enable “Suspicious login” rule - Other Recipients: CTO

B.

Enable “Suspended user made active” rule - Other Recipients: CTO

C.

Enable “Email settings changed” rule - -Other Recipients: CTO

D.

Enable “Suspended user made active” rule and select “Deliver to” Super Administrator(s)

Full Access
Question # 39

Your global marketing team has over 500 employees. They recently started working with Google Analytics and want to move to managed accounts You decide to use Google Cloud Directory Sync (GCDS) to sync users from your current identity provider Your organization currently has no Google Workspace licenses linked to the Admin console You run GCDS for the first lime and receive the following error. "Domain user limit reached " You need to identify and fix the problem What should you do?

A.

Ensure that there is a subscription available and enough licenses to sync the new users

B.

Check if GCDS has the correct permissions to run a sync on your domain

C.

Wait 48 hours until the domain is fully provisioned

D.

Update the delete limits of GCDS and try again

Full Access
Question # 40

Your organization is about to expand by acquiring two companies, both of which are using Google Workspace. The CISO has mandated that strict ‘No external content sharing’ policies must be in place and followed. How should you securely configure sharing policies to satisfy both the CISO’s mandate while allowing external sharing with the newly acquired companies?

A.

Allow external sharing of Drive content for the IT group only.

B.

Create a Drive DLP policy that will allow sharing to only domains on an allowlist.

C.

Use shared drives to store the content, and share only individual files externally.

D.

Let users share files between the two companies by using the ‘Trusted Domains’ feature. Create an allowlist of the trusted domains, and choose sharing settings for the users.

Full Access
Question # 41

Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.

What should you do?

A.

Educate users on creating personal contacts for the Partner Employees.

B.

Add a secondary domain for the Partner Company and create user entries for each Partner user.

C.

Create shared contacts in the Directory using the Directory API.

D.

Create shared contacts in the Directory using the Domain Shared Contacts API.

Full Access
Question # 42

Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Workspace data should be stored in a separate backup environment.

How should you store data for this situation?

A.

Use routing rules to dual-deliver mail to an on-premises SMTP server and Google Workspace.

B.

Write a script and use Google Workspace APIs to access and download user data.

C.

Use a third-party tool to configure secure backup of Google Workspace data.

D.

Train users to use Google Takeout and store their archives locally.

Full Access
Question # 43

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

A.

Review the authorized applications for each user via the Google Workspace Admin panel.

B.

Create a survey via Google forms, and collect the application data from users.

C.

Review the token audit log, and compile a list of all the applications and their scopes.

D.

Review the API permissions installed apps list, and export the list.

Full Access
Question # 44

The security team for your organization is concerned about phishlng attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks?

Choose 2 answers

A.

Configure spoofing and authentication controls to quarantine messages that are perceived as threats

B.

Train end users to mark messages as spam when they see something suspicious.

C.

Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.

D.

Enforce confidents mode for all messages sent and received from your Workspace domain

E.

Force encryption on all inbound and outbound emails from your Workspace domain.

Full Access
Question # 45

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.

What two actions should you take? (Choose two.)

A.

Configure objectionable content to reject messages with the words “wire transfer.”

B.

Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.

C.

Create a rule requiring secure transport for all messages regarding wire transfers.

D.

Add the sender of the wire transfer email to the blocked senders list.

E.

Enable all admin settings in Gmail's safety > spoofing and authentication.

Full Access
Question # 46

A user does not follow their sign-in pattern and signs In from an unusual location As an admin, what should you do in response to this alert for this user during this investigation?

A.

Add Two Factor Authentication to the Domain

B.

First suspend the account and then investigate

C.

Enhance your security alerts for tracking sign-in patterns

D.

Investigate the account for unauthorized activity in the Login and Security Audit Log

Full Access
Question # 47

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace.

What should you do?

A.

Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.

B.

In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.

C.

Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.

D.

Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.

Full Access
Question # 48

The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.

What should you do?

A.

Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.

B.

Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.

C.

Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.

Full Access
Question # 49

The compliance team at your organization is conducting a legal investigation into some concerning sales activities of an employee eight months ago The compliance team contacted you for assistance on the situation You set up the default Google Vault retention rules so all data is retained only for one year You must assist the compliance team with the investigation What should you do1?

A.

Do nothing The retention period has already ended and the evidence has already been purged

B.

Suspend the employee and export all data by using Google Takeout

C.

Assign the compliance team a Google Vault administrator role and create a legal hold for the employee

D.

D. Assign the compliance team a Google Vault administrator role and change the default retention rules to three years.

Full Access
Question # 50

Your team is collaborating on a new project by using a Google Doc They are using Doc comments to add numerous questions and suggestions You want to ensure that sensitive data in the Doc comments does not appear in the recipients' inboxes when a user is notified that a comment has been assigned to them What should you do?

A.

Set up an email quarantine to quarantine all incoming emails that contain sensitive data

B.

Disable comments in the Google Doc for your users

C.

Create a Gmail content compliance rule and turn oft dynamic email for your team

D.

Create a Gmail content compliance rule to block incoming messages that contain sensitive data

Full Access
Question # 51

With the help of a partner, you deployed Google Workspace last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things Google Workspace so that you can be prepared to take advantage of new features and ensure that your organization gets the most out of the platform.

What should you do?

A.

Develop a cadence of regular roadmap and business reviews with your partner.

B.

Regularly scan the admin console and keep track of any new features you identify.

C.

Create a Feature Release alert in the Alert Center to be alerted to new functionality.

D.

Put half of your organization on the Rapid Release Schedule to highlight differences.

Full Access
Question # 52

Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook. How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?

A.

Allow external sharing with the auditor using the ‘Trusted Domains’ feature.

B.

Enable the ‘Visitor Sharing’ feature, and demonstrate it to the Finance team.

C.

Use the ‘Publish’ feature in the Sheets editor to share the contents externally.

D.

Attach the Sheet file to an email message, and send to the external auditor.

Full Access
Question # 53

Your organization deployed Google Workspace Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your Google Workspace organization.

What should you do?

A.

Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.

B.

Use Work Insights to gather adoption metrics and target your training exercises.

C.

Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.

D.

Use a script to monitor Email attachment types and target users that aren't using Drive sharing.

Full Access
Question # 54

Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing “Secret Project 123.”

What steps should you take to satisfy this request?

A.

Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to “secret project 123.” Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, user2@your-company.com. Save.

B.

Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to: (secret project 123). Save.

C.

Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your- company.com AND user2@your-company.com. Set the search terms to: secret AND project AND 123. Save.

D.

Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to secret OR project OR 123. Save.

Full Access
Question # 55

The helpdesk at your organization reports that many users in multiple locations are not able to access Gmail, but can access other Workspace services. You must troubleshoot the issue What should you do first?

A.

Open a ticket with Google Support listing the affected users.

B.

Check the Google Workspace status dashboard to see whether there is a disruption in Gmail service availability

C.

Check the Google Workspace release calendar to ensure there’s not a Gmail upgrade scheduled

D.

Check network connectivity of the affected users

Full Access
Question # 56

Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.

You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing. Which two solutions would help you mitigate the risk at minimal cost?

Choose 2 answers

A.

Deploy 2-Step Verification for all users who have security keys.

B.

Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.

C.

Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

D.

Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.

E.

For all executives, create new accounts with random characters to match Google best practices, migrate

data from the former accounts, and then delete them.

Full Access
Question # 57

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these new users, without updating the information of pre­existing users?

A.

Add the acquired domain as an alias to the primary Google Workspace domain.

B.

Add the acquired domain as a secondary domain to the primary Google Workspace domain, and then update the email information of all new users with alias emails.

C.

Update the Google-provided test domain to be the domain of the acquired company, and then update the email information of all new users with alias emails.

D.

Without adding a domain, update each user's email information with the previous domain.

Full Access
Question # 58

Your company is using macOS devices for all employees and has built a process to allow a Google account to be used as credentials (or the device Your company wants to manage newly acquired Windows 10 devices with Google Workspace endpoint management and have employees use their Google Workspace account as login credentials for Windows 10 Which steps should you take to enable this?

Choose 2 answers

A.

Install and configure Google Credential Provider for Windows (GCPW) on each device

B.

Configure Chrome policies on Windows to push advanced device management policies

C.

Enable Windows device management in Devices > Mobile & endpoints > Settings > Windows settings

D.

Sync the Google Accounts and password to AD via Google Cloud Directory Sync V1 (GCDS)

E.

Install and configure Password Sync on each Active Directory (AD) domain controller

Full Access
Question # 59

You are a Workspace Administrator with a mix of Business Starter and Standard Licenses for your users. A Business Starter User in your domain mentions that they are running out of Drive Storage Quota. Without deleting data from Drive, what two actions can you take to alleviate the quota concerns for this user? (Choose two.)

A.

Add other users as “Editors” on the Drive object, thus spreading the storage quota debt between all of them.

B.

Manually export and back up the data locally, and delete the affected files from Drive to alleviate the debt.

C.

Make another user the “Owner” of the Drive objects, thus transferring the storage quota debt to them.

D.

Perform an API query for large storage drive objects, and delete them, thus alleviating the quota debt.

E.

Move the affected items to a Shared Drive. Shared Drives transfer ownership of the drive item to the domain itself, which alleviates the quota debt from that user.

Full Access