ExamGecko
Ask Question

Google Associate Google Workspace Administrator Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company's human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

Search the sender's email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

Search the sender's email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

Search for the sender's email address by using the security investigation tool. Mark the messages as phishing. Add the sender's email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

Search for the sender's email address by using the security investigation tool. Mark the messages as phishing. Add the sender's email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

Collect a list of users who received the messages. Search the recipients' email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender's email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

Collect a list of users who received the messages. Search the recipients' email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender's email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

Search for the sender's email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Search for the sender's email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Suggested answer: B
Explanation:

The security investigation tool in Google Workspace allows you to identify the impacted users and messages. By marking the messages as phishing, you acknowledge their malicious nature, helping to protect the users. Adding the sender's email address to the Blocked senders list ensures that future messages from this sender will be automatically blocked, preventing recurrence of similar incidents.

asked 19/03/2025
Henock Asmerom
43 questions

Question 12

Report Export Collapse

Your organization's users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

Adjust the organization's mail content compliance settings in the Admin console.

Adjust the organization's mail content compliance settings in the Admin console.

Advise users to individually allowlist senders.

Advise users to individually allowlist senders.

Disable spam filtering for all users.

Disable spam filtering for all users.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Suggested answer: D
Explanation:

If legitimate emails are being misidentified as spam across the organization, it suggests that there may be a broader issue with the spam filtering system. Contacting Google Workspace support to investigate and resolve the problem is the recommended approach. Disabling spam filtering or adjusting individual settings may not resolve the root cause and could potentially lead to further issues.

asked 19/03/2025
Stefan Hupfloher
55 questions

Question 13

Report Export Collapse

Your organization's security team has published a list of vetted third-party apps and extensions that can be used by employees. All other apps are prohibited unless a business case is presented and approved. The Chrome Web Store policy applied at the top-level organization allows all apps and extensions with an admin blocklist. You need to disable any unapproved apps that have already been installed and prevent employees from installing unapproved apps. What should you do?

Change the Chrome Web Store allow/block mode setting to allow all apps, admin manages blocklist, In the App access control card, block any existing web app that is not on the security team's vetted list.

Change the Chrome Web Store allow/block mode setting to allow all apps, admin manages blocklist, In the App access control card, block any existing web app that is not on the security team's vetted list.

Change the Chrome Web Store allow/block mode setting to block all apps, admin manages allowlist. Add the apps on the security team's vetted list to the allowlist.

Change the Chrome Web Store allow/block mode setting to block all apps, admin manages allowlist. Add the apps on the security team's vetted list to the allowlist.

Disable Extensions and Chrome packaged apps as Allowed types of apps and extensions for the top-level organizational unit. Selectively enable the appropriate extension types for each suborganization

Disable Extensions and Chrome packaged apps as Allowed types of apps and extensions for the top-level organizational unit. Selectively enable the appropriate extension types for each suborganization

Disable the Chrome Web Store service for the top-level organizational unit. Enable the Chrome Web Store service for organizations that require Chrome apps and extensions.

Disable the Chrome Web Store service for the top-level organizational unit. Enable the Chrome Web Store service for organizations that require Chrome apps and extensions.

Suggested answer: B
Explanation:

Changing the Chrome Web Store policy to block all apps and managing an allowlist ensures that only vetted, approved apps are allowed for installation. This approach enforces the security team's policy by restricting access to unapproved apps while enabling the installation of only those apps that have been explicitly approved. This method provides control over what can be installed, aligning with the organization's security requirements.

asked 19/03/2025
Musaddiq Shorunke
48 questions

Question 14

Report Export Collapse

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company's security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

Assign the User Management Admin role to the security team.

Assign the User Management Admin role to the security team.

Assign the super admin role to the security team

Assign the super admin role to the security team

Create an administrator role with Security Center access. Assign the role to the security team.

Create an administrator role with Security Center access. Assign the role to the security team.

Suggested answer: D
Explanation:

To allow the security team to investigate potential security breaches using the security investigation tool, you should create a custom administrator role with Security Center access. This role will provide the security team with the necessary permissions to access and use the security investigation tool without granting them unnecessary permissions, such as those associated with User Management or Super Admin roles. This approach ensures both security and compliance with industry regulations.

asked 19/03/2025
Petros Kapouleas
51 questions

Question 15

Report Export Collapse

Your company's security team has requested two requirements to secure employees' mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

Implement a third-party enterprise mobility management (EMM) provider.

Implement a third-party enterprise mobility management (EMM) provider.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

Set up basic management for both iOS and Android devices.

Set up basic management for both iOS and Android devices.

Set up advanced management for both iOS and Android devices.

Set up advanced management for both iOS and Android devices.

Suggested answer: D
Explanation:

Advanced mobile management in Google Workspace provides the necessary features for securing mobile devices without the need for third-party apps or additional licenses. This includes enforcing passcodes and enabling remote account wipe functionality for both iOS and Android devices. Advanced management ensures that both security requirements are met while keeping the setup efficient and within the organization's existing licenses.

asked 19/03/2025
Swen Leuning
57 questions

Question 16

Report Export Collapse

Your organization needs an approval application for purchases where a user can enter information on the purchase required and then submit it for management approval. You need to suggest a solution to create the application that must be available on both the web and mobile devices. Your organization does not have software developers or the budget to hire a third party. What should you do?

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

Suggest the organization use AppSheet to create the application.

Suggest the organization use AppSheet to create the application.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

Suggested answer: C
Explanation:

AppSheet is a no-code platform that allows users to create custom applications without the need for software development skills. It is capable of building applications that can be used both on the web and mobile devices. AppSheet would allow the organization to create the approval application efficiently, meeting the requirements of the purchase process, and would be a cost-effective solution that does not require hiring developers or using a third-party application provider.

asked 19/03/2025
Gurdeep Girn
38 questions

Question 17

Report Export Collapse

Your organization is concerned about unauthorized access attempts. You want to implement a security measure that makes users change their password if there are twenty or more failed login attempts within one hour. You want to use the most effective and efficient approach. What should you do?

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.

Enable email alerts to notify users that they need to change their password.

Enable email alerts to notify users that they need to change their password.

Suggested answer: B
Explanation:

Creating an activity rule for user log events allows you to monitor failed login attempts within a specific time period (such as one hour) and set a threshold (like twenty attempts). This rule can automatically trigger an action, such as forcing a password change, when the defined threshold is met. This is the most effective and efficient approach to addressing unauthorized access attempts while ensuring that security measures are enforced without manual intervention.

asked 19/03/2025
Muhammed Seyda UCAK
37 questions

Question 18

Report Export Collapse

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee's documents for the manager and the team.

You want to minimize license cost. What should you do?

Delete the former employee's Workspace account.

Delete the former employee's Workspace account.

Suspend former employee's Workspace account.

Suspend former employee's Workspace account.

Reset the password of the former employee and keep their Workspace license active.

Reset the password of the former employee and keep their Workspace license active.

Switch the license type of the former employee's Workspace account to an Archived User license.

Switch the license type of the former employee's Workspace account to an Archived User license.

Suggested answer: D
Explanation:

Switching the former employee's account to an Archived User license ensures that their data and documents are preserved, and access is retained for the manager and team without incurring the full cost of an active Workspace license. Archived User licenses are a cost-effective way to maintain access to documents while preventing unauthorized access to the account.

asked 19/03/2025
Patrick Duglay Piceda
39 questions

Question 19

Report Export Collapse

Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?

End all unsupervised meetings by using the Google Meet APIs.

End all unsupervised meetings by using the Google Meet APIs.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.

Identify and end all unsupervised meetings by using the security investigation tool.

Identify and end all unsupervised meetings by using the security investigation tool.

Suggested answer: A
Explanation:

Using the Google Meet APIs allows you to programmatically end all unsupervised meetings quickly. This approach is the most effective for managing unsupervised meetings in real-time, especially if there are multiple such meetings happening across the organization. It provides a centralized method to monitor and take action on these meetings, ensuring security and preventing misuse.

asked 19/03/2025
Vyas Dookhun
38 questions

Question 20

Report Export Collapse

Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?

Add the Trusted Workspace domain names in the Stream dialog box.

Add the Trusted Workspace domain names in the Stream dialog box.

Turn off live streaming to Youtube.

Turn off live streaming to Youtube.

Add participants to an organizational unit (OU). Turn on live streaming.

Add participants to an organizational unit (OU). Turn on live streaming.

Turn on in-house live streaming. Invite users from affiliated domains.

Turn on in-house live streaming. Invite users from affiliated domains.

Suggested answer: C
Explanation:

By organizing participants into an organizational unit (OU) in the Admin console, you can control access to live streaming and ensure that only users from affiliated Google Workspace domains are allowed to participate in the live-streamed meetings. Turning on live streaming within this context will ensure that the meeting is restricted to the appropriate participants from the specified domains.

asked 19/03/2025
brandon landaal
47 questions
Total 73 questions
Go to page: of 8
Search

Related questions