Google Associate Google Workspace Administrator Practice Test - Questions Answers, Page 4

List of questions
Question 31

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?
Create and enforce a new password policy for all users in your organization.
Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.
Create an activity rule that is triggered by the User's password changed event. Add compliance team members as email recipients.
Create a new alert by using user log events. Check that the challenge type is ''Password'', and add the compliance team as email recipients.
Creating an activity rule that triggers on the 'User's password changed' event allows you to automatically notify the compliance team whenever a user updates or resets their password. This approach is efficient because it directly ties the event to the rule and sends alerts without requiring manual monitoring or additional steps. By adding the compliance team as email recipients, you ensure they are promptly notified of any changes.
Question 32

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender's logs. You want to troubleshoot the issue. What should you do?
Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.
Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.
Disable and re-enable the Calendar service for the affected users to refresh their connection.
Check the affected users' Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.
Using the Google Admin Toolbox to analyze the message headers of the sent invitations helps you identify if there are any issues with the delivery of the invitations, such as misrouted messages or issues with email delivery to the affected users. This approach will give you detailed information on what might be causing the issue, even if no error messages appear in the sender's logs.
Question 33

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.
What should you do?
Export the resource list to a CSV file, make the changes, and re-import the updated file.
Edit each resource in the Google Admin console.
Add the modified rooms as new resources. Tell employees not to use old rooms.
Delete the existing resources and recreate the resources with the updated information.
Exporting the resource list to a CSV file, making the necessary updates, and then re-importing the file is the most efficient method for updating multiple conference rooms at once. This approach allows you to make bulk updates quickly without needing to edit each resource individually or delete and recreate rooms. It also ensures that the updated information is applied to all affected rooms at once.
Question 34

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.
You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?
Configure the allowed list of apps in the Devices page in the apps and extensions settings.
Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.
Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.
Require 2SV for user logins.
To ensure that Chrome apps and extension policies are applied regardless of which user logs into the device, you should configure the allowed list of apps in the Devices section of the apps and extensions settings. This policy applies at the device level, ensuring that the restrictions are enforced for any user who logs into that device, providing consistent security across the organization.
Question 35

Your company's help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?
Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.
Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).
Turn off more aggressive spam filtering in spam policies that are applied to the users' organizational unit and add the senders' mail system IP addresses to the email allowlist.
Create an address list of approved senders so messages from these users bypass Gmail's spam filters and recipients can decide whether they are spam or not.
Asking employees to mark legitimate emails as 'Not spam' helps train Gmail's spam filter to correctly identify these senders as trusted. This is a quick and effective way to correct the issue without introducing any additional risk or changes to the email filtering settings. Over time, Gmail will learn to recognize these senders as legitimate, reducing the likelihood of their messages being misclassified as spam in the future.
Question 36

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?
Conduct a Vault search to find this email and identify if additional users were affected.
Conduct a search to find all emails sent by the sender by using the Gmail API.
Conduct an Email reports search to find this email and all of the email's recipients.
Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.
The security investigation tool is specifically designed for investigating security incidents like spam and phishing emails. It allows you to search for emails, review their details, and determine the scope of the incident, including identifying whether other users were affected. This tool is the most appropriate and efficient way to respond to the incident.
Question 37

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?
Turn Google Sites access on for each of the 15 users in the task force.
Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.
Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.
Create an access group for the task force's 15 users. Grant Google Sites access to the group.
Creating a new organizational unit (OU) for the task force members and turning on Google Sites access for that OU is the least disruptive and most efficient approach. It allows you to target only the users in the task force, granting them temporary access to Google Sites without impacting the rest of the organization. This solution also provides clear control over the access, which can be easily modified when the task force's work is completed.
Question 38

Your organization collects credit card information in customer files. You need to implement a policy for your organization's Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?
Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to ''block external sharing'', and enables the ''Log event'' option.
Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.
Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.
Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.
A data loss prevention (DLP) rule with the predefined credit card number detector will help you identify and prevent the accidental sharing of files that contain sensitive credit card information. Setting the action to 'block external sharing' ensures that such files cannot be shared externally. Enabling the 'Log event' option will record any incidents of external sharing for auditing and reporting purposes, fulfilling both the security and reporting requirements.
Question 39

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?
Analyze the audit log in the Admin console for device and application activity.
Analyze the security investigation tool to access device log data.
Analyze the Google Workspace reporting section of the Admin console.
Analyze the User Accounts section in the Google Admin console.
The audit log in the Google Admin console provides detailed information about device and application activity, which is crucial for investigating a potential data breach. You can see which devices have accessed corporate data, as well as which applications were used, giving you a comprehensive view of any unauthorized or suspicious activities. This is the most appropriate and efficient tool for this investigation.
Question 40

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?
Create a Google Group, enable collaborative inbox settings, set posting permissions to ''Anyone on the web'', and add the customer support agents as group members.
Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.
Create a Google Group, add the support agents to the group, and set the posting permissions to ''Public.''
Set up an inbox for the customer support team. Provide the login credentials to the customer support team.
A Google Group with collaborative inbox settings allows you to evenly distribute support request emails among the team. By setting the posting permissions to ''Anyone on the web,'' external customers can send emails directly to the group, and the emails will be distributed to the support agents as tasks. This is a cost-effective solution that also provides an organized way to manage and track customer support requests.
Question