ExamGecko
Ask Question

Google Associate Google Workspace Administrator Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?

Create and enforce a new password policy for all users in your organization.

Create and enforce a new password policy for all users in your organization.

Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.

Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.

Create an activity rule that is triggered by the User's password changed event. Add compliance team members as email recipients.

Create an activity rule that is triggered by the User's password changed event. Add compliance team members as email recipients.

Create a new alert by using user log events. Check that the challenge type is ''Password'', and add the compliance team as email recipients.

Create a new alert by using user log events. Check that the challenge type is ''Password'', and add the compliance team as email recipients.

Suggested answer: C
Explanation:

Creating an activity rule that triggers on the 'User's password changed' event allows you to automatically notify the compliance team whenever a user updates or resets their password. This approach is efficient because it directly ties the event to the rule and sends alerts without requiring manual monitoring or additional steps. By adding the compliance team as email recipients, you ensure they are promptly notified of any changes.

asked 19/03/2025
Jaroslaw Walaszek
49 questions

Question 32

Report Export Collapse

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender's logs. You want to troubleshoot the issue. What should you do?

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

Check the affected users' Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Check the affected users' Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Suggested answer: A
Explanation:

Using the Google Admin Toolbox to analyze the message headers of the sent invitations helps you identify if there are any issues with the delivery of the invitations, such as misrouted messages or issues with email delivery to the affected users. This approach will give you detailed information on what might be causing the issue, even if no error messages appear in the sender's logs.

asked 19/03/2025
Echo Wind
31 questions

Question 33

Report Export Collapse

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.

What should you do?

Export the resource list to a CSV file, make the changes, and re-import the updated file.

Export the resource list to a CSV file, make the changes, and re-import the updated file.

Edit each resource in the Google Admin console.

Edit each resource in the Google Admin console.

Add the modified rooms as new resources. Tell employees not to use old rooms.

Add the modified rooms as new resources. Tell employees not to use old rooms.

Delete the existing resources and recreate the resources with the updated information.

Delete the existing resources and recreate the resources with the updated information.

Suggested answer: A
Explanation:

Exporting the resource list to a CSV file, making the necessary updates, and then re-importing the file is the most efficient method for updating multiple conference rooms at once. This approach allows you to make bulk updates quickly without needing to edit each resource individually or delete and recreate rooms. It also ensures that the updated information is applied to all affected rooms at once.

asked 19/03/2025
Tommy Svendsen
42 questions

Question 34

Report Export Collapse

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

Require 2SV for user logins.

Require 2SV for user logins.

Suggested answer: A
Explanation:

To ensure that Chrome apps and extension policies are applied regardless of which user logs into the device, you should configure the allowed list of apps in the Devices section of the apps and extensions settings. This policy applies at the device level, ensuring that the restrictions are enforced for any user who logs into that device, providing consistent security across the organization.

asked 19/03/2025
Brad Jarrett
50 questions

Question 35

Report Export Collapse

Your company's help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?

Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.

Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.

Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).

Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).

Turn off more aggressive spam filtering in spam policies that are applied to the users' organizational unit and add the senders' mail system IP addresses to the email allowlist.

Turn off more aggressive spam filtering in spam policies that are applied to the users' organizational unit and add the senders' mail system IP addresses to the email allowlist.

Create an address list of approved senders so messages from these users bypass Gmail's spam filters and recipients can decide whether they are spam or not.

Create an address list of approved senders so messages from these users bypass Gmail's spam filters and recipients can decide whether they are spam or not.

Suggested answer: A
Explanation:

Asking employees to mark legitimate emails as 'Not spam' helps train Gmail's spam filter to correctly identify these senders as trusted. This is a quick and effective way to correct the issue without introducing any additional risk or changes to the email filtering settings. Over time, Gmail will learn to recognize these senders as legitimate, reducing the likelihood of their messages being misclassified as spam in the future.

asked 19/03/2025
Martin Simmons
41 questions

Question 36

Report Export Collapse

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

Conduct a Vault search to find this email and identify if additional users were affected.

Conduct a Vault search to find this email and identify if additional users were affected.

Conduct a search to find all emails sent by the sender by using the Gmail API.

Conduct a search to find all emails sent by the sender by using the Gmail API.

Conduct an Email reports search to find this email and all of the email's recipients.

Conduct an Email reports search to find this email and all of the email's recipients.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Suggested answer: D
Explanation:

The security investigation tool is specifically designed for investigating security incidents like spam and phishing emails. It allows you to search for emails, review their details, and determine the scope of the incident, including identifying whether other users were affected. This tool is the most appropriate and efficient way to respond to the incident.

asked 19/03/2025
adnan ayyash
48 questions

Question 37

Report Export Collapse

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

Turn Google Sites access on for each of the 15 users in the task force.

Turn Google Sites access on for each of the 15 users in the task force.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Suggested answer: C
Explanation:

Creating a new organizational unit (OU) for the task force members and turning on Google Sites access for that OU is the least disruptive and most efficient approach. It allows you to target only the users in the task force, granting them temporary access to Google Sites without impacting the rest of the organization. This solution also provides clear control over the access, which can be easily modified when the task force's work is completed.

asked 19/03/2025
Johan Benavides
52 questions

Question 38

Report Export Collapse

Your organization collects credit card information in customer files. You need to implement a policy for your organization's Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?

Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to ''block external sharing'', and enables the ''Log event'' option.

Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to ''block external sharing'', and enables the ''Log event'' option.

Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.

Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.

Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.

Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.

Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.

Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.

Suggested answer: A
Explanation:

A data loss prevention (DLP) rule with the predefined credit card number detector will help you identify and prevent the accidental sharing of files that contain sensitive credit card information. Setting the action to 'block external sharing' ensures that such files cannot be shared externally. Enabling the 'Log event' option will record any incidents of external sharing for auditing and reporting purposes, fulfilling both the security and reporting requirements.

asked 19/03/2025
Soli Rash
37 questions

Question 39

Report Export Collapse

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Analyze the audit log in the Admin console for device and application activity.

Analyze the audit log in the Admin console for device and application activity.

Analyze the security investigation tool to access device log data.

Analyze the security investigation tool to access device log data.

Analyze the Google Workspace reporting section of the Admin console.

Analyze the Google Workspace reporting section of the Admin console.

Analyze the User Accounts section in the Google Admin console.

Analyze the User Accounts section in the Google Admin console.

Suggested answer: A
Explanation:

The audit log in the Google Admin console provides detailed information about device and application activity, which is crucial for investigating a potential data breach. You can see which devices have accessed corporate data, as well as which applications were used, giving you a comprehensive view of any unauthorized or suspicious activities. This is the most appropriate and efficient tool for this investigation.

asked 19/03/2025
Emanuel Sifuentes
50 questions

Question 40

Report Export Collapse

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Create a Google Group, enable collaborative inbox settings, set posting permissions to ''Anyone on the web'', and add the customer support agents as group members.

Create a Google Group, enable collaborative inbox settings, set posting permissions to ''Anyone on the web'', and add the customer support agents as group members.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

Create a Google Group, add the support agents to the group, and set the posting permissions to ''Public.''

Create a Google Group, add the support agents to the group, and set the posting permissions to ''Public.''

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Suggested answer: A
Explanation:

A Google Group with collaborative inbox settings allows you to evenly distribute support request emails among the team. By setting the posting permissions to ''Anyone on the web,'' external customers can send emails directly to the group, and the emails will be distributed to the support agents as tasks. This is a cost-effective solution that also provides an organized way to manage and track customer support requests.

asked 19/03/2025
VEDA VIKASH Matam Shashidhar
46 questions
Total 73 questions
Go to page: of 8
Search

Related questions