Filters
Question type

Study Flashcards

Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in G Suite Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error. What should you do?


A) Install Google Cloud Directory Sync on all Domain Controllers.
B) Install Google Workspace Sync for Microsoft Outlook on all employees' computers.
C) Install Google Cloud Directory Sync on a supported server.
D) Install Google Apps Manager to automate add-user scripts.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization. What should you do?


A) Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
B) Use Work Insights to gather adoption metrics and target your training exercises.
C) Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
D) Use a script to monitor Email attachment types and target users that aren't using Drive sharing.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes. What action should you take?


A) Company Profile > Profile > New User Features > Enable "Scheduled Release"
B) Apps > Google Workspace > Gmail > Uncheck "Enable Gmail Labs for my users"
C) Company Profile > Profile > New User Features > Enable "Rapid Release"
D) Device Management > Chrome > Device Settings > Stop auto-updates

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app. What should you do?


A) For the Finance OU, enable the third-party app in SAML apps.
B) For the Finance OU, enable the third-party app in Marketplace Apps.
C) At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.
D) At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

You have configured your Google Workspace account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization. What should you do?


A) Create a new OU and tum on the rapid release track just for this OU.
B) Create a new Google Group with test users and enable the rapid release track.
C) Establish a separate Dev environment, and set it to rapid release.
D) Ask Google for a demo account with beta access to the new features.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say "Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE." You are responsible for making sure that users cannot remove the footer. What should you do?


A) Send an email to each sales person with the instructions on how to add the footer to their Signature.
B) Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.
C) Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.
D) Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

How can you monitor increases in user reported Spam as identified by Google?


A) Review post-delivery activity in the Email logs.
B) Review user-reported spam in the Investigation Tool.
C) Review spike in user-reported spam in the Alert center.
D) Review post-delivery activity in the BigQuery Export.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

In the years prior to your organization moving to G Suite, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on G Suite.) You were able to address active employees' use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account. What should you do?


A) Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-G Suite Google services and have them blocked.
B) Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
C) Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
D) Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all G Suite and Other Google Services disabled.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information. What should you do?


A) Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
B) Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
C) Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
D) Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to G Suite data, the data they have access to, and the number of users who are using the applications. How should you compile the data being requested?


A) Review the authorized applications for each user via the G Suite Admin panel.
B) Create a survey via Google forms, and collect the application data from users.
C) Review the token audit log, and compile a list of all the applications and their scopes.
D) Review the API permissions installed apps list, and export the list.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing "Secret Project 123." What steps should you take to satisfy this request?


A) Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to "secret project 123." Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, user2@your-company.com. Save.
B) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to: (secret project 123) . Save.
C) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your-company.com AND user2@your-company.com. Set the search terms to: secret AND project AND 123. Save.
D) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to secret OR project OR 123. Save.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements. Which combination of attributes will meet this objective?


A) Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
B) Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
C) Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
D) Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Your employer, a media and entertainment company, wants to provision Google Workspace Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact information and initiate collaboration with the VIPs using Google Workspace services such as Docs, Chat, and Calendar. You are responsible for configuring to meet these requirements. What should you do?


A) In the Users list, find the VIPs and turn off the User setting "Directory Sharing."
B) Create a Group for the VIPs and their handlers, and set the Group Access Level to Restricted.
C) In Directory Settings, disable Contact Sharing.
D) Create separate Custom Directories for the VIPs and regular employees.

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management. What should you do?


A) Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
B) Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of G Suite.
C) Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
D) Change Google Workspace release track to: Rapid Release for faster access to new features.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Your CISO is concerned about third party applications becoming compromised and exposing G Suite data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?


A) Create a report using the OAuth Token Audit Activity logs.
B) Create a report using the Calendar Audit Activity logs.
C) Create a report using the Drive Audit Activity logs.
D) Create a reporting using the API Permissions logs for Installed Apps.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications. What two actions should you take? (Choose two.)


A) Whitelist Trusted Apps
B) Disable the Drive SDK
C) Restrict API scopes
D) Disable add-ons for Gmail
E) Whitelist Google Workspace Marketplace apps

F) A) and D)
G) B) and C)

Correct Answer

verifed

verified

The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing. What should you do?


A) Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
B) Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
C) Create two Drive Audit Alerts, one for each user, where the Visibility is "Shared Externally," and email them to the Director.
D) Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in G Suite. What should you do?


A) Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.
B) In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.
C) Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.
D) Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

User A is a Basic License holder. User B is a Business License holder. These two users, along with many additional users, are in the same organizational unit at the same company. When User A attempts to access Drive, they receive the following error: "We are sorry, but you do not have access to Google Docs Editors. Please contact your Organization Administrator for access." User B is not presented with the same error and accesses the service without issues. How do you provide access to Drive for User A?


A) Select User A in the Directory, and under the Apps section, check whether Drive and Docs is disabled. If so, enable it in the User record.
B) In Apps > G Suite > Drive and Docs, select the organizational unit the users are in and enable Drive for the organizational unit.
C) In Apps > G Suite, determine the Group that has Drive and Docs enabled as a service. Add User A to this group.
D) Select User A in the Directory, and under the Licenses section, change their license from Basic to Business to add the Drive and Docs service.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request. What should you do?


A) Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
B) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
C) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
D) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 71

Related Exams

Show Answer