Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You work for a midsize organization Your compliance and audit learn sees that users are frequently resetting their passwords You must provide accurate information and ensure that the compliance team is informed every time a user changes their password What should you do?

A.

Create a new alert by using user log events and check that event Login type is Google password and include the compliance team in the email notifications

B.

Check the User's password changed alert in the alert center and include the compliance team in the email notifications

C.

Disable user account recovery so users must contact you before a reset

D.

Enable user account recovery and forward any alert to the compliance team through the alert center

Full Access
Question # 5

Your company policy requires that managers be provided access to Drive data once an employee leaves the company.

How should you grant this access?

A.

Make the manager a delegate to the former employee's account.

B.

Copy the data from the former employee’s My Drive to the manager's My Drive.

C.

Transfer ownership of all Drive data using the file transfer ownership tool in the Google Workspace Admin console.

D.

Login as the user and add the manager to the file permissions using the “Is owner’ privilege for all Drive files.

Full Access
Question # 6

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?

A.

Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”

B.

Admin.google.com > Reporting > Reports > Apps Reports > Gmail

C.

chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com

D.

Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Full Access
Question # 7

You have implemented a data loss prevention (DLP) policy for a specific finance organizational unit. You want to apply the same security policy to a shared drive owned by the finance department in the most efficient manner. What should you do?

A.

In the Admin console sharing settings, select the finance organizational unit and deselect Allow users outside the domain to access files in shared drives

B.

Assign the Shared Drive to the finance organizational unit

C.

Create a new DLP policy for shared drive users

D.

Change the scope of the policy to apply to all in the domain

Full Access
Question # 8

Your organization is moving from a legacy mail system to Google Workspace This move will happen in phases During the first phase, some of the users in the domain are set up to use a different identity provider (IdP) for logging in You need to set up multiple idPs for various users What should you do?

A.

Enable single sign-on (SSO) with third-party identity providers and exclude the users who are using a different provider

B.

Enable single sign-on (SSO) with Cloud Identity and use Cloud Directory Sync to manage multiple identity providers

C.

Create Security Assertion Markup Language (SAML) based single sign-on (SSO) profiles and assign them to specific organizational units or groups of users.

D.

Nothing Google uses cookies to establish a user's relationship to a device This will cover multiple identity providers

Full Access
Question # 9

Your organization has a data loss prevention (DLP) rule to detect and warn users about external sharing of sensitive files in Google Drive You also want to prevent external users from downloading files with viewer permissions to their local machines What should you do?

A.

Do nothing. View-only Drive files automatically prevent the user from downloading the files

B.

Modify the existing DLP rule to Disable download, print, and copy for commenters and viewers

C.

Create a new DLP rule by using the existing content detector conditions but change the action for the new rule to Disable download. print, and copy for commenters and viewers

D.

Create a new DLP rule and set the scope to the organizational unit or group that you want to restrict

Full Access
Question # 10

You work at a large global holding firm with multiple companies that are united under one Google Workspace deployment. You must ensure that employees can only access documents at the company in which they are employed What should you do?

A.

Create a User group for each company and change Google Drive sharing settings to block external sharing

B.

Create an organizational unit (OU) for each company and disable file sharing.

C.

Set up data loss prevention (DLP) rules to prevent specific documents from being shared

D.

Set up Google Drive trust rules to prevent access to documents from individual companies

Full Access
Question # 11

Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled.

What two actions should you take to support the chief security officer's request? (Choose two.)

A.

Review who has viewed files using the Google Drive Activity Dashboard.

B.

Create an alert from Drive Audit reports to notify of external file sharing.

C.

Review total external sharing in the Aggregate Reports section.

D.

Create a custom Dashboard for external sharing in the Security Investigation Tool.

E.

Automatically block external sharing using DLP rules.

Full Access
Question # 12

You are the administrator for a 30.000-user organization. You have multiple Workspace licensing options available to end users in your domain, according to their work responsibilities. A user may be transitioned to a different license type multiple times in a given year. Your organization has a high turnover rate for employees. What is the most efficient way to manage your organization's licensing?

A.

Use the Directory API to create a custom batch script that modifies the users license on a daily basis

B.

Create a license assignment rule in the Google Admin console to set user licensing based on directory attributes.

C.

Use Google Cloud Directory Sync to modify user licensing with each sync, according to information available in the organization's LDAP

D.

Update user licensing in the user portion of the Admin console on an as-needed basis.

Full Access
Question # 13

A user is reporting that after they sign in to Gmail, their labels are not loading and buttons are not responsive. What action should you take to troubleshoot this issue with the user?

A.

Collect full message headers for examination.

B.

Check whether the issue occurs when the user authenticates on a different device or a new incognito window.

C.

Check whether a ping test to service.gmail.com (pop.gmail.com or imap.gmail.com) is successful.

D.

Check whether traceroute to service.gmail.com (pop.gmail.com or imap.gmail.com) is successful.

Full Access
Question # 14

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

A.

Reinstall Password Sync on all domain controllers.

B.

Reauthorize the Password Sync tool in the Google Workspace Admin Console.

C.

Confirm that the Password Sync service is running on all domain controllers.

D.

Reset the user's password in Active Directory.

Full Access
Question # 15

A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?

A.

Use Security Investigation Tool to Search Google Drive events for all of the user's documents, and use Google Admin > Reports > Email Log Search to find their emails.

B.

Search Google Drive for all of the user’s documents, and ask them to forward all of their emails.

C.

Use the Gmail API and Google Drive API to automatically collect and export data.

D.

Utilize Google Vault to hold, search, and export data of interest.

Full Access
Question # 16

Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward.

What should you do?

A.

Disable access to all “Other Services” in the Google Workspace Admin Console.

B.

Use the Transfer Tool for unmanaged accounts to invite users into the domain.

C.

Use the Data Migration Service to transfer the data to a managed account.

D.

Open a support ticket to have Google transfer unmanaged accounts into your domain.

Full Access
Question # 17

Your organization has enabled spoofing protection against unauthenticated domains. You are receiving complaints that email from multiple partners is not being received. While investigating this issue, you find that emails are all being sent to quarantine due to the configured safety setting. What should be the next step to allow uses to review these emails and reduce the internal complaints while keeping your environment secure?

A.

Add your partner domains IPs to the Inbound Gateway setting.

B.

Change the spoofing protection to deliver the emails to spam instead of quarantining them.

C.

Add your partner sending IP addresses to an allowlist.

D.

Change the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.

Full Access
Question # 18

You have enrolled a new Google Meet hardware device for an existing conference room in your building Your users report that the new hardware in the conference does not show the expected calendar events You need to investigate and fix the problem What should you do?

A.

Make sure that the conference room resource calendar has been created and that the Meet Hardware is associated with that resource

B.

Create a brand new resource calendar and associate the Meet Hardware with that new resource

C.

Use the Meet Quality Tool in the control panel to search for the newly installed Meet Hardware

D.

Make sure the Access permissions for the resource calendar is set to "See all event details

Full Access
Question # 19

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

A.

Review the authorized applications for each user via the Google Workspace Admin panel.

B.

Create a survey via Google forms, and collect the application data from users.

C.

Review the token audit log, and compile a list of all the applications and their scopes.

D.

Review the API permissions installed apps list, and export the list.

Full Access
Question # 20

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?

A.

Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.

B.

Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.

C.

Set the option "Allow calendar-based room release" for all targeted rooms.

D.

Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.

Full Access
Question # 21

Your large organization, 80,000 users, has been on Google for two years. Your CTO wants to create an integrated team experience with Google Groups, Teams Drives, and Calendar. Users will use a Google Form and Apps Script to request a new “G-Team.” A “G-Team’ is composed of a Google Group and a Team Drive/ Secondary Calendar that is shared using that Google Group.

What two design decisions are required to implement this workflow securely? (Choose two.)

A.

The Apps Script will need to run as a Google Workspace admin.

B.

You will need a Cloud SQL instance to store “G-Team’ data.

C.

The Google Form will need to be limited to internal users only.

D.

The Apps Script will need to run on a timed interval to process new entries.

E.

The Google Form will need to enforce Group naming conventions.

Full Access
Question # 22

You are configuring a customer relationship management (CRM) solution to integrate with Google Workspace services for the sales department at your organization The CRM solution is in the Google Workspace Marketplace and you deploy the specific CRM solution Employees report that there are no contacts and documents visible in the CRM solution You must identify and fix the problem What should you do?

A.

Check the OAuth scopes and ensure that Drive and Gmail scopes are granted for the CRM solution

B.

Check if Manage access to apps is set to Allow users to install and run any app from the Marketplace

C.

Revoke all OAuth scopes and reinstall the CRM solution for just the sales department.

D.

Check if the App distribution settings are set to ON for everyone in your organization

Full Access
Question # 23

Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else.

What two things should you do? (Choose two.)

A.

Disable Guest Mode and Public Sessions.

B.

Enable a Device Policy of Sign In Screen and add the employee email address.

C.

Enroll a 2-Factor hardware key on the device using the employee email address.

D.

Enable a User Policy of Multiple Sign In Access and add just the employee email address.

E.

Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.

Full Access
Question # 24

As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager. As the Workspace Administrator, what should you do to preserve this user's Drive data?

A.

In the user deletion process, select “Transfer” in the data in other apps section and add the manager's email address.

B.

Use Google Vault to set a retention period on the OU where the users reside.

C.

Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.

D.

Ask the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.

Full Access
Question # 25

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?

A.

Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.

B.

Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.

C.

Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.

D.

Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.

Full Access
Question # 26

Four weeks ago. you exported data from Google Vault and emailed the PST export file to your legal admin. They accidentally deleted the PST file and need it sent again. What steps should you take to re-send the PST file to the legal admin?

A.

Return to the Google Vault export page, and download the ZIP file again.

B.

Return to the Email Log Search page, and download the PST file again.

C.

Ask the legal admin to return to Google Vault to download the PST file again.

D.

Repeat the original search for the original timeframe, and export the data again.

Full Access
Question # 27

As the Workspace Administrator, you have been asked to enable the help desk team to share incoming support requests from end users The help desk team has ten users who need to respond to support requests that are sent to a help desk email address. The users must be able to respond by email and assign ownership of tickets. Finally, the help desk team is highly mobile and will need to manage help desk tickets from their mobile devices. How would you provide this functionality for the help desk team?

A.

Configure a Google Group as a collaborative inbox, and assign the required Groups permissions to the help desk team members.

B.

Create a help desk Workspace mail account, and set the help desk team as mail delegates to the help desk account.

C.

Create the help desk group as a Q&A Group, and add the "Manager role to the help desk team users.

D.

In Google Drive, create a help desk request form, and give the help desk team the ability to view the inbound requests.

Full Access
Question # 28

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.

What should you do?

A.

Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.

B.

Change Enrollment Controls to Place Chrome device in user organization.

C.

Change Enrollment Controls to Keep Chrome device in current location.

D.

Change Enrolment Permissions to not allow users in this organization to enroll new devices.

Full Access
Question # 29

Your organization is working on a confidential project with details that cannot be shared through email with anyone outside your organization You want to add controls in Gmail that prevent any mention of the project from being sent by employees Only the CEO and the CFO can send information about the project over email and without a delay What should you do?

A.

Configure the Gmail Restrict delivery setting and add an allowlist with all domains that your employees are allowed to send emails to Include the CEO and CFO email addresses to the allowlist

B.

Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project Bypass the rule by using the address list with the CEO and CFO email addresses.

C.

Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project Manually review all quarantined emails and choose to deliver the ones sent by the CEO and CFO

D.

Configure the Gmail Restrict delivery setting for all outgoing messages, except the internal emails Add the CEO and CFO email

Full Access
Question # 30

Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail’s address autocomplete for all users in the domain.

What are two options to meet this requirement? (Choose two.)

A.

Use the Directory API to upload a .csv file containing the contacts.

B.

Configure GCDS to populate a Group with external members.

C.

Use the People API to upload a .csv file containing the contacts.

D.

Develop a custom application to call the Domain Shared Contacts API.

E.

Configure GCDS to synchronize shared contacts.

Full Access
Question # 31

An employee at your organization is experiencing video call issues in Google Meet and they were unable to resolve the issues by themselves You need to troubleshoot the issue What should you do first?

A.

View the Meet quality report of the employee

B.

Ask your network administrator to add the dedicated Meet IP address range for your users

C.

Restart the device of the employee

D.

Check the Meet settings of the employee

Full Access
Question # 32

Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as “view data for all teams” to the HR group, but it is reporting an error when accessing the application. What should you do?

A.

Allocate the “view data for all teams” permission to all employees of the company.

B.

Confirm that the Work Insights app is turned ON for all employees.

C.

Confirm in Security > API controls > App Access Controls that Work Insights API is set to “unrestricted.”

D.

Confirm in Reports > BigQuery Export that the job is enabled.

Full Access
Question # 33

As the Workspace Administrator, you have been asked to configure Google Cloud Directory Sync (GCDS) in order to manage Google Group memberships from an internal LDAP server. However, multiple Google Groups must have their memberships managed manually. When you run the GCDS sync, you notice that these manually managed groups are being deleted. What should you do to prevent these groups from being deleted?

A.

In the GCDS configuration manager, update the group deletion policy setting to “don't delete Google groups not found in LDAP.”

B.

Use the Directory API to check and update the group’s membership after the GCDS sync is completed.

C.

Confirm that the base DN for the group email address attribute matches the base DN for the user email address attribute.

D.

In the user attribute settings of the GCDS configuration manager options, set the Google domain users deletion/suspension policy to “delete only active Google domain users not found in LDAP.”

Full Access
Question # 34

Your organization recently deployed Google Workspace. Your admin team has been very focused on configuring the core services for your environment, which has left you little time to pay attention to other areas. Your security team has just informed you that many users are leveraging unauthorized add-ons, and they are concerned about data exfiltration. The admin team wants you to cut off all add-ons access to Workspace data immediately and block all future add-ons until further notice. However, they approve of users leveraging their Workspace accounts to sign into third-party sites. What should you do?

A.

Modify your Marketplace Settings to block users from installing any app from the Marketplace.

B.

Set all API services to “restricted access” and ensure that all connected apps have limited access.

C.

Remove all client IDs and scopes from the list of domain-wide delegation API clients.

D.

Block each connected app's access.

Full Access
Question # 35

Employees at your organization frequently and mistakenly delete important emails that they receive from your payroll department The employees have to file support tickets for the IT team to find and restore these emails You must provide an automated solution that minimizes IT overhead and prevents these emails from being permanently deleted from their inboxes What should you do?

A.

Create a content compliance rule that targets internal messages Use an advanced content match for the sender header to match the

payroll department's email Quarantine the message so that administrators can review the email before they release it to the user

B.

Create an Apps Script project that uses the Gmail API to find any recently deleted emails and automatically restore them to the inboxes Set

the script trigger to be time-driven and run every hour

C.

Create a content compliance rule that targets all internal messages that are sent from the payroll department Modify the message by

prepending a custom subject line to all payroll emails so that employees know not to delete them

D.

Create an activity rule by using Gmail log events with two conditions one for the event of an email deletion and another that matches the header address to the payroll department's email Create an action that restores messages Set the rule to run every hour

Full Access
Question # 36

Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What steps should you take from the admin panel to preventusers from copying data from work to personal apps on iOS devices? (Choose Two)

A.

Clear the "allow users to copy data to personal apps" checkbox.

B.

Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Data Protection

C.

Turn on "Advanced Mobile Management."

D.

Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Open Docs in Unmanaged Apps

E.

Clear the "allow items created with managed apps to open in unmanaged apps" checkbox.

Full Access
Question # 37

An administrator accidentally deleted several Workspace user accounts from the Google Admin Console two weeks ago. How can you recover the deleted user accounts?

A.

Open a Google support ticket, and request a recovery of all recently deleted users.

B.

Sign in to the Admin console as Help Desk Admin, open user management, filter for "recently deleted." and recover.

C.

Sign in to the Admin console as Super Admin, open user management, filter for "recently deleted." and recover.

D.

Create a matter, go to legal hold, and create a legal hold for the user accounts.

Full Access
Question # 38

Your admin quarantine is becoming a burden to manage due to a consistently high influx of messages that match the content compliance rule Your security team will not allow you to remove or relax this rule, and as a result, you need assistance processing the messages in the quarantine. What is the first step you should take to enable others to help manage the quarantine, while maintaining security?

A.

Give the users super admin rights to view the admin quarantine.

B.

Give the users Services > Gmail > Access Admin Quarantine admin privileges.

C.

Configure the admin quarantine to allow end users to release messages.

D.

Give the users Services > Security Center admin privileges.

Full Access
Question # 39

Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?

A.

Create a configuration group with the approved users as members, and use it to create a target audience.

B.

Enable external sharing for the marketing and sales organizational units.

C.

Enable external sharing only to allowlisted domains provided by marketing and sales teams.

D.

Create a configuration group with the approved users as members, and enable external sharing for this group.

Full Access
Question # 40

Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook. How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?

A.

Allow external sharing with the auditor using the ‘Trusted Domains’ feature.

B.

Enable the ‘Visitor Sharing’ feature, and demonstrate it to the Finance team.

C.

Use the ‘Publish’ feature in the Sheets editor to share the contents externally.

D.

Attach the Sheet file to an email message, and send to the external auditor.

Full Access
Question # 41

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?

A.

Remove Google Workspace license to prevent users from accessing their accounts now.

B.

Suspend users that the organization does not wish to have access.

C.

Add the users to the OU with all services disabled.

D.

Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.

Full Access
Question # 42

Multiple users across the organization are experiencing video degradation in Meet video calls. As an administrator, what steps should you take to start troubleshooting?

A.

Troubleshoot network bandwidth for the organizer of the meeting.

B.

Push the Meet quality tool to end user devices and run local reports to determine connectivity issues.

C.

Locate the Meet quality tool, and review the output for issues with quality.

D.

Update the Admin Console Meet settings to disable streaming.

Full Access
Question # 43

How can you monitor increases in user reported Spam as identified by Google?

A.

Review post-delivery activity in the Email logs.

B.

Review user-reported spam in the Investigation Tool.

C.

Review spike in user-reported spam in the Alert center.

D.

Rev]Biw post-delivery activity in the BigQuery Export.

Full Access
Question # 44

Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information.

What should you do?

A.

Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.

B.

Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.

C.

Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

D.

Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

Full Access
Question # 45

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?

A.

Delete the user's account in the Admin Console.

B.

Transfer data between end user Workspace accounts.

C.

Instruct a Google Vault admin to create a matter, and place all the user data on ‘hold.’

D.

Use Google Vault to export all the user data and share among the security team.

Full Access
Question # 46

A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?

A.

Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.

B.

Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.

C.

Immediately suspend the user's account, assign an archived user license, and export data.

D.

Suspend the user's account, search all associated users data in Google Vault, and export the data.

Full Access
Question # 47

Your employer, a media and entertainment company, wants to provision Google Workspace Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact information and initiate collaboration with the VIPs using Google Workspace services such as Docs, Chat, and Calendar.

You are responsible for configuring to meet these requirements. What should you do?

A.

In the Users list, find the VIPs and turn off the User setting “Directory Sharing.”

B.

Create a Group for the VIPs and their handlers, and set the Group Access Level to Restricted.

C.

In Directory Settings, disable Contact Sharing.

D.

Create separate Custom Directories for the VIPs and regular employees.

Full Access
Question # 48

Your default Vault retention policy for Gmail is set to 365 days Your legal department has just informed you that emails sent and received by the customer support department are sensitive and must be retained for only 30 days You must enforce this new retention policy in the simplest way What should you do?

A.

Change the current default retention policy in Vault for Gmail to 30 days and apply it to the customer support organizational unit (OU) Configure a custom retention policy for Gmail for 365 days for your domain

B.

Create two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

C.

Change the current default retention policy for Gmail to 30 days Configure two custom retention policies in Vault one for 30 days that is applied to the customer support organizational unit (OU) and one for 365 days that is applied to all other OUs in your directory

D.

Create a custom retention policy in Vault for Gmail for 30 days and apply it to the customer support organizational unit (OU)

Full Access
Question # 49

Security and Compliance has identified that data is being leaked through a third-party application connected to Google Workspace. You want to investigate using an audit log.

What log should you use?

A.

Admin audit log

B.

SAML audit log

C.

Drive usage audit log

D.

OAuth Token audit log

Full Access
Question # 50

Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.

What should you do?

A.

Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.

B.

Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.

C.

Create a blocked senders list at the Sales OU that contains the mass email sender addresses.

D.

Create an approved senders list at the Market Research OU that contains the mass email sender addresses.

Full Access
Question # 51

Your global marketing team has over 500 employees. They recently started working with Google Analytics and want to move to managed accounts You decide to use Google Cloud Directory Sync (GCDS) to sync users from your current identity provider Your organization currently has no Google Workspace licenses linked to the Admin console You run GCDS for the first lime and receive the following error. "Domain user limit reached " You need to identify and fix the problem What should you do?

A.

Ensure that there is a subscription available and enough licenses to sync the new users

B.

Check if GCDS has the correct permissions to run a sync on your domain

C.

Wait 48 hours until the domain is fully provisioned

D.

Update the delete limits of GCDS and try again

Full Access
Question # 52

What action should be taken to configure alerting related to phishing attacks?

A.

Set up a Token audit log event alert.

B.

Set up an Admin audit log event alert.

C.

Set up an email settings changed alert.

D.

Set up a suspicious login event alert.

Full Access
Question # 53

Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.

What are two ways you should accomplish this? (Choose two.)

A.

Use the Data Export Tool to export admin audit data to your existing SIEM system

B.

Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.

C.

Use Apps Script and the Reports API to export drive audit data to the existing SIEM system

D.

Use the BigQuery export to send admin audit data to the existing SIEM system via custom code

E.

Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.

Full Access
Question # 54

Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes.

What action should you take?

A.

Company Profile > Profile > New User Features > Enable “Scheduled Release”

B.

Apps > Google Workspace > Gmail > Uncheck “Enable Gmail Labs for my users”

C.

Company Profile > Profile > New User Features > Enable “Rapid Release”

D.

Device Management > Chrome > Device Settings > Stop auto-updates

Full Access
Question # 55

You want to create a list of IP addresses that are approved to send email to your domain. To accomplish this, what section of the Google Workspace Admin console should you update?

A.

Bypass spam filter

B.

Content compliance rule

C.

Approved email denylist

D.

Email allowlist

Full Access
Question # 56

Your organization is in the process of deploying Google Drive for desktop so that your users can access Drive files directly from their desktops. For security reasons, you want to restrict Drive for desktop to only company-owned devices. What two steps should you take from the admin panel to restrict Drive for desktop to only company-owned devices?

Choose 2 answers

A.

Create a company-owned device inventory using an asset tag.

B.

Devices > Endpoints > Add a filter-> Management Type > Drive for desktop > Apply

C.

Apps > Google Workspace > Drive and Docs > Features and Applications > Google Drive for Desktop > Only Allow Google Drive for desktop on authorized devices

D.

Install the Google Endpoint Verification extension on machines using Drive for Desktop.

E.

Create a company-owned device inventory using serial numbers of devices.

Full Access
Question # 57

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching in preparation for the risk assessment you want to quickly review all the security-related settings for Gmail, Drive and Calendar and identify the ones that may be posing risk What should you do?

A.

Review all the alerts in the Alert center

B.

Review the Security health page in the Admin console

C.

Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps

D.

Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.

Full Access
Question # 58

Users in your organization are routinely complaining that they receive messages containing words of profanity they find inappropriate in a professional setting. As the administrator what steps should you take to prevent the messages from being delivered to users mailboxes?

A.

Configure an objectionable content rule

B.

Configure an attachment compliance rule

C.

Enable optical character recognition (OCR)

D.

Set up a Gmail DLP policy.

Full Access