ExamGecko
Home Home / Google / Professional Collaboration Engineer

Google Professional Collaboration Engineer Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











What action should be taken to configure alerting related to phishing attacks?

A.
Set up a Token audit log event alert.
A.
Set up a Token audit log event alert.
Answers
B.
Set up an Admin audit log event alert.
B.
Set up an Admin audit log event alert.
Answers
C.
Set up an email settings changed alert.
C.
Set up an email settings changed alert.
Answers
D.
Set up a suspicious login event alert.
D.
Set up a suspicious login event alert.
Answers
Suggested answer: D

Explanation:

Reference: https://support.google.com/a/answer/9104586?hl=en

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.

What should you do?

A.
Turn on password expiration.
A.
Turn on password expiration.
Answers
B.
Enforce 2FA with a physical security key.
B.
Enforce 2FA with a physical security key.
Answers
C.
Use a third-party identity provider.
C.
Use a third-party identity provider.
Answers
D.
Enforce 2FA with Google Authenticator app.
D.
Enforce 2FA with Google Authenticator app.
Answers
Suggested answer: D

Explanation:

Reference: https://support.google.com/a/answer/175197?hl=en

After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.

What should you do?

A.
Add the legal team to the User Management Admin system role.
A.
Add the legal team to the User Management Admin system role.
Answers
B.
Add the legal team to the Google Vault Google Group.
B.
Add the legal team to the Google Vault Google Group.
Answers
C.
Create a custom role with Google Vault access, and add the legal team.
C.
Create a custom role with Google Vault access, and add the legal team.
Answers
D.
Create a matter in Google Vault, and share with the legal team.
D.
Create a matter in Google Vault, and share with the legal team.
Answers
Suggested answer: C

Explanation:

Reference: https://gsuite.google.com/products/vault/

Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.

Which combination of attributes will meet this objective?

A.
Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers >choose Reject.
A.
Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers >choose Reject.
Answers
B.
Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
B.
Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
Answers
C.
Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit CardNumbers > choose Reject.
C.
Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit CardNumbers > choose Reject.
Answers
D.
Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > chooseReject.
D.
Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > chooseReject.
Answers
Suggested answer: D

Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.

What two features are essential to reconfigure in Google Workspace? (Choose two.)

A.
Apps > add SAML apps to your domain.
A.
Apps > add SAML apps to your domain.
Answers
B.
Reconfigure user provisioning via Google Cloud Directory Sync.
B.
Reconfigure user provisioning via Google Cloud Directory Sync.
Answers
C.
Replace the third-party IDP verification certificate.
C.
Replace the third-party IDP verification certificate.
Answers
D.
Disable SSO with third party IDP.
D.
Disable SSO with third party IDP.
Answers
E.
Enable API Permissions for Google Cloud Platform.
E.
Enable API Permissions for Google Cloud Platform.
Answers
Suggested answer: A, C

Explanation:

Reference: https://support.google.com/a/answer/60224?hl=en

On which two platforms can you push WiFi connection information with Google Workspace? (Choose two.)

A.
Mac OS
A.
Mac OS
Answers
B.
Windows
B.
Windows
Answers
C.
Chrome OS
C.
Chrome OS
Answers
D.
iOS
D.
iOS
Answers
E.
Linux
E.
Linux
Answers
Suggested answer: C, D

Explanation:

Reference: https://support.google.com/a/answer/2634553?hl=en

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.

What should you do?

A.
Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
A.
Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
Answers
B.
Change Enrollment Controls to Place Chrome device in user organization.
B.
Change Enrollment Controls to Place Chrome device in user organization.
Answers
C.
Change Enrollment Controls to Keep Chrome device in current location.
C.
Change Enrollment Controls to Keep Chrome device in current location.
Answers
D.
Change Enrolment Permissions to not allow users in this organization to enroll new devices.
D.
Change Enrolment Permissions to not allow users in this organization to enroll new devices.
Answers
Suggested answer: A

A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges.

You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs. What two actions should be taken on this call with the user? (Choose two.)

A.
Ask the user to send an email to you so you can check the headers.
A.
Ask the user to send an email to you so you can check the headers.
Answers
B.
Record a HAR file of the user composing a new email.
B.
Record a HAR file of the user composing a new email.
Answers
C.
Take screenshots of the user's screen when composing an email.
C.
Take screenshots of the user's screen when composing an email.
Answers
D.
Use the Email log search in the Admin panel.
D.
Use the Email log search in the Admin panel.
Answers
E.
Check the Users > App Users Activity report.
E.
Check the Users > App Users Activity report.
Answers
Suggested answer: C, E

Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app.

What should you do?

A.
For the Finance OU, enable the third-party app in SAML apps.
A.
For the Finance OU, enable the third-party app in SAML apps.
Answers
B.
For the Finance OU, enable the third-party app in Marketplace Apps.
B.
For the Finance OU, enable the third-party app in Marketplace Apps.
Answers
C.
At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.
C.
At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.
Answers
D.
At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.
D.
At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.
Answers
Suggested answer: B

Explanation:

Reference: https://support.google.com/a/answer/6089179?hl=en

The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue.

What two actions should you take? (Choose two.)

A.
Obtain the message header and analyze using Google Workspace Toolbox.
A.
Obtain the message header and analyze using Google Workspace Toolbox.
Answers
B.
Review the contents of the messages in Google Vault.
B.
Review the contents of the messages in Google Vault.
Answers
C.
Set up a Gmail routing rule to whitelist the sender.
C.
Set up a Gmail routing rule to whitelist the sender.
Answers
D.
Conduct an Email log search to trace the message route.
D.
Conduct an Email log search to trace the message route.
Answers
E.
Validate that your domain is not on the Spamhaus blacklist.
E.
Validate that your domain is not on the Spamhaus blacklist.
Answers
Suggested answer: A, C
Total 79 questions
Go to page: of 8