ExamGecko
Home Home / Google / ChromeOS Administrator

Google ChromeOS Administrator Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











What is the recommended way to provision users from an on-prem Active Directory environment into the Google Admin console?

A.
Upload via CSV
A.
Upload via CSV
Answers
B.
Admin SDK Directory API
B.
Admin SDK Directory API
Answers
C.
Azure AD Google Cloud/G Suite Connector
C.
Azure AD Google Cloud/G Suite Connector
Answers
D.
Google Cloud Directory Sync
D.
Google Cloud Directory Sync
Answers
Suggested answer: D

Explanation:

The 'Deprovision' command is specifically designed to remove a ChromeOS device from management policy updates. This means the device will no longer receive updates, configurations, or restrictions pushed from the Google Admin console.

Here's what happens when you deprovision a device:

Policy Removal:All enterprise policies and configurations are removed from the device.

Management Removal:The device is disassociated from the Google Admin console and no longer considered managed.

Data Wipe (Optional):You can choose to wipe the device's data during deprovisioning to ensure no company data remains.

Other options like 'Reset,' 'Disable,' or 'Powerwash' may have different effects:

Reset:Resets the device to factory settings but might not remove management if not done through the Admin console.

Disable:Prevents the user from signing in but doesn't remove policies or management.

Powerwash:Factory resets the device,removing all user data and configurations,including management.

Deprovision a device:https://support.google.com/chrome/a/answer/3523633

To allow remote users to securely connect to an internal network, the organization you're supporting is using a VPN. The organization would like you to configure the ChromeOS devices so that the Android VPN clients deployed are automatically configured with the correct hostname. How should you configure this in the Admin Console according to Google best practice?

A.
Download the Android app on a ChromeOS device, add the hostname manually then re-upload the app in the organization's private Google Play Store and deploy it lo all ChromeOS devices
A.
Download the Android app on a ChromeOS device, add the hostname manually then re-upload the app in the organization's private Google Play Store and deploy it lo all ChromeOS devices
Answers
B.
Contact the VPN provider and ask them to provide you with a custom installable client with the correct configuration pre-configured Then deploy that installable
B.
Contact the VPN provider and ask them to provide you with a custom installable client with the correct configuration pre-configured Then deploy that installable
Answers
C.
Add a managed configuration using JSON to the Android app
C.
Add a managed configuration using JSON to the Android app
Answers
D.
Upload a JSON file with the configuration into the Google Play Store
D.
Upload a JSON file with the configuration into the Google Play Store
Answers
Suggested answer: C

Explanation:

This is the most efficient and scalable way to automatically configure Android VPN clients on ChromeOS devices with the correct hostname:

Obtain Configuration:Get the required VPN configuration details (hostname,authentication methods,etc.) from the VPN provider or your organization's network administrator.This configuration is typically in JSON format.

Create Managed Configuration:In the Google Admin console,navigate to Devices > Chrome > Settings > Android Apps > Managed Configurations.

Select the VPN App:Choose the specific Android VPN app you want to configure.

Add JSON Configuration:Paste the JSON configuration into the provided field.Ensure the configuration is valid and accurate.

Save and Deploy:Save the managed configuration and apply it to the desired organizational units (OUs) containing the ChromeOS devices.

This method allows you to centrally manage VPN configurations for Android apps on ChromeOS devices, ensuring consistency and reducing the manual effort required from users.

Your customer is deploying ChromeOS devices in their environment and requires those ChromeOS devices to adhere to web filtering via TLS (or SSL) Inspection. What recommendations should you make to your customer in setting up the requirements for ChromeOS devices?

A.
Configure a hostname allowlist, set up a TLS (or SSL) certificate, then verify TLS (or SSL) inspection is working
A.
Configure a hostname allowlist, set up a TLS (or SSL) certificate, then verify TLS (or SSL) inspection is working
Answers
B.
Reach out lo Google Workspace Security and Compliance for tailored configurations for your customer
B.
Reach out lo Google Workspace Security and Compliance for tailored configurations for your customer
Answers
C.
Configure a transparent proxy, set up your allowlist to use * google com. then verify TLS (or SSL) inspection is working
C.
Configure a transparent proxy, set up your allowlist to use * google com. then verify TLS (or SSL) inspection is working
Answers
D.
ChromeOS devices are preconfigured to adhere to company TLS (or SSL) inspection by default and can therefore be deployed with no additional configuration
D.
ChromeOS devices are preconfigured to adhere to company TLS (or SSL) inspection by default and can therefore be deployed with no additional configuration
Answers
Suggested answer: A

Explanation:

To set up TLS (or SSL) inspection for web filtering on ChromeOS devices, you need to follow these steps:

Configure Hostname Allowlist:Create an allowlist of hostnames (e.g.,*.google.com,*[invalid URL removed]) that should bypass TLS inspection.This ensures that essential services like Google services and your own domain can function properly.

Set up TLS Certificate:Obtain the required TLS/SSL certificate from your web filter provider and install it on your web filter.ChromeOS devices need this certificate to establish a secure connection with the web filter for TLS inspection.

Verify TLS Inspection:Once the configuration is in place,test and verify that TLS inspection is working as expected.This involves checking if the web filter can correctly intercept and decrypt HTTPS traffic for websites not on the allowlist.

Why other options are not correct:

Option B:While reaching out to Google Workspace Security and Compliance can be helpful,it's not the primary step in setting up TLS inspection.The configuration needs to be done on the web filter and ChromeOS devices.

Option C:Transparent proxies are generally not recommended for ChromeOS devices as they can interfere with certain functionalities.While it might work with an allowlist for Google domains,it's not the best practice.

Option D:ChromeOS devices do not come preconfigured to adhere to company TLS inspection.This configuration needs to be set up explicitly by the administrator.

About TLS (or SSL) inspection on ChromeOS devices:https://support.google.com/chrome/a/answer/3504942

Verify TLS (or SSL) inspection works:https://support.google.com/chrome/a/answer/3504943


As a ChromeOS Administrator, you are tasked with blocking incognito mode in the ChromeOS Browser. How would you prevent users from using incognito mode?

A.
Navigate to 'Users & Browser Security Settings' and set the 'Disallow incognito mode' policy
A.
Navigate to 'Users & Browser Security Settings' and set the 'Disallow incognito mode' policy
Answers
B.
Go ,0 'User & Browser Settings' to restrict sign-in to pattern and 'Disallow incognito mode '
B.
Go ,0 'User & Browser Settings' to restrict sign-in to pattern and 'Disallow incognito mode '
Answers
C.
From 'Device Settings' change Kiosk settings to 'Disallow incognito mode '
C.
From 'Device Settings' change Kiosk settings to 'Disallow incognito mode '
Answers
D.
ln 'Enrollment Settings' disable vended access and incognito mode (or content protection
D.
ln 'Enrollment Settings' disable vended access and incognito mode (or content protection
Answers
Suggested answer: A

Explanation:

Access the Google Admin Console: Sign in to the Admin console using your ChromeOS administrator credentials.

Locate User Settings: Navigate to 'Device Management' > 'Chrome Management' > 'User & browser settings'.

Find Incognito Mode Policy: Within the settings, search for 'Incognito mode'.

Disable Incognito Mode: Select the option to 'Disallow incognito mode'.

Save Changes: Click 'Save' to apply the policy to the designated users or organizational units.

Set up Chrome browser on managed devices: https://support.google.com/chrome/a/answer/3523633?hl=en

What format of certificate encoding is incompatible with ChromeOS devices?

A.
PEM
A.
PEM
Answers
B.
CER
B.
CER
Answers
C.
DER
C.
DER
Answers
D.
CRT
D.
CRT
Answers
Suggested answer: C

Explanation:

ChromeOS primarily uses the PEM format for certificate encoding. While it can handle other formats like CER and CRT, it does not support the DER format. DER is a binary format, while ChromeOS requires certificates in a text-based format.

A customer deploys a large number of ChromeOS devices and would like to start the process of turning on Zero-Touch Enrollment (ZTE) to streamline their deployment process. As an administrator, what would be required to enable ZTE?

A.
Grant partner admin access
A.
Grant partner admin access
Answers
B.
identify OU to place devices during enrollment
B.
identify OU to place devices during enrollment
Answers
C.
Create a zero-touch token
C.
Create a zero-touch token
Answers
D.
Create a pre-provisioning token
D.
Create a pre-provisioning token
Answers
Suggested answer: B

Explanation:

Zero-touch enrollment (ZTE) automates the device enrollment process when users first power on their ChromeOS devices. Before you can enable ZTE, you need to determine the organizational unit (OU) where the devices should be placed during enrollment. This is crucial because different OUs can have different policies and configurations applied to them.

Plan Your OU Structure:If you haven't already,create a well-organized OU structure in your Google Admin console that reflects your organization's hierarchy and device management needs.

Select the Target OU:Choose the specific OU where you want the ZTE-enrolled devices to reside.Consider factors like department,location,or device type when making your decision.

Once you've identified the appropriate OU, you can proceed with creating a zero-touch enrollment token and associating it with that OU. This will ensure that newly enrolled devices are automatically placed in the correct OU and inherit the desired policies.

You are tasked with adding a security key to a single user account Where should you navigate to?

A.
Users > Select User > Password
A.
Users > Select User > Password
Answers
B.
Users > Select User > Security
B.
Users > Select User > Security
Answers
C.
Security > 2-step Verification
C.
Security > 2-step Verification
Answers
D.
Security > Password Management
D.
Security > Password Management
Answers
Suggested answer: B

Explanation:

To add a security key to a specific user account in the Google Admin console, follow these steps:

Sign in to Google Admin console:Use your administrator credentials to access the console.

Navigate to Users:Click on 'Users' in the left sidebar to view the list of users in your domain.

Select User:Choose the specific user account to which you want to add the security key.

Go to Security Tab:In the user's profile,click on the 'Security' tab.

Add Security Key:Under the '2-Step Verification' section,you'll find the option to add a security key.Follow the on-screen instructions to register the security key with the user's account.

This method allows you to manage the security settings of individual users, including the addition of security keys for enhanced login protection.

How would you deploy a Progressive Web Application to all managed user accounts?

A.
Force-install the Progressive Web Application URL in the 'Chrome Apps & extensions' page
A.
Force-install the Progressive Web Application URL in the 'Chrome Apps & extensions' page
Answers
B.
Set up Chrome Imprivata shared apps & extensions to force-install the Progressive Web Application URL
B.
Set up Chrome Imprivata shared apps & extensions to force-install the Progressive Web Application URL
Answers
C.
Go to 'User & Browser Settings' and add the Progressive Web Application URL in the 'Legacy Browser Support' site list
C.
Go to 'User & Browser Settings' and add the Progressive Web Application URL in the 'Legacy Browser Support' site list
Answers
D.
Open 'Additional Google services' to force-install the Progressive Web Application URL
D.
Open 'Additional Google services' to force-install the Progressive Web Application URL
Answers
Suggested answer: A

Explanation:

To deploy a Progressive Web Application (PWA) to all managed user accounts, follow these steps in the Google Admin console:

Sign in to Google Admin console:Use your administrator credentials to access the console.

Navigate to Device Management:Go to Devices > Chrome > Settings > Apps & extensions.

Select User or Group:Choose the top-level organizational unit or a specific group to apply the PWA deployment.

Add by URL:Click on the yellow '+' icon and select 'Add by URL.'

Enter PWA URL:Paste the URL of the PWA you want to deploy.

Configure Installation Policy:Select 'Force install' to ensure the PWA is automatically installed for all users within the selected scope.

This method allows you to centrally manage and deploy PWAs across your organization, making them easily accessible to users on their ChromeOS devices.

How would you deploy your 'Terms of Services' page to all managed ChromeOS devices?

A.
Navigate to 'Chrome Verified Access' and enable the policy for content protection
A.
Navigate to 'Chrome Verified Access' and enable the policy for content protection
Answers
B.
Go to 'User & Browser and 'Managed Guest Session' settings to upload your terms of service
B.
Go to 'User & Browser and 'Managed Guest Session' settings to upload your terms of service
Answers
C.
ln 'User & Browser Settings' upload the 'Terms of Service' as a wallpaper
C.
ln 'User & Browser Settings' upload the 'Terms of Service' as a wallpaper
Answers
D.
Navigate to 'User & Browser' and 'Managed Guest Session' settings to upload your custom avatar
D.
Navigate to 'User & Browser' and 'Managed Guest Session' settings to upload your custom avatar
Answers
Suggested answer: B

Explanation:

Go to the Google Admin console.

Navigate to 'Device Management' > 'Chrome Management' > 'User & browser settings'.

Find the section for 'Managed Guest Session'.

Locate the setting for 'Terms of Service'.

Upload your 'Terms of Service' document in plain text format.

This will present your Terms of Service to users when they log in as a guest on any managed ChromeOS device.

Why other options are incorrect:

A . Chrome Verified Access: This is for controlling access to corporate resources, not displaying terms of service.

C . Wallpaper: Using the wallpaper to display terms of service is not practical or user-friendly.

D . Custom avatar: The avatar is for user personalization and not related to terms of service.

What are two methods for signing in to a Chrome OS device? Choose 2 answers

A.
SMS code sent to mobile phone
A.
SMS code sent to mobile phone
Answers
B.
Single sign-on
B.
Single sign-on
Answers
C.
Google Friend Connect
C.
Google Friend Connect
Answers
D.
Facebook Connect
D.
Facebook Connect
Answers
Suggested answer: B, D

Explanation:

Single sign-on (SSO): This allows users to sign in to their Chrome OS device using their organizational credentials. This is particularly useful in enterprise or educational settings where users already have an existing account.

Facebook Connect: This allows users to sign in to their Chrome OS device using their Facebook credentials. This can be convenient for users who are already logged into Facebook on another device.

Options A and C are incorrect:

SMS code sent to mobile phone: This is not a standard sign-in method for Chrome OS devices.

Google Friend Connect: This was a social networking service that has been discontinued.

Total 60 questions
Go to page: of 6