ExamGecko
Home Home / Google / Professional Collaboration Engineer

Google Professional Collaboration Engineer Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request.

What should you do?

A.
Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
A.
Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Answers
B.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
B.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
Answers
C.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
C.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Answers
D.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
D.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
Answers
Suggested answer: D

Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification.

You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

A.
Enable Enforce Strong Password policy.
A.
Enable Enforce Strong Password policy.
Answers
B.
Enable Employee ID Login Challenge.
B.
Enable Employee ID Login Challenge.
Answers
C.
Decrease the Maximum User Session Length.
C.
Decrease the Maximum User Session Length.
Answers
D.
Revoke token authorizations to external applications.
D.
Revoke token authorizations to external applications.
Answers
Suggested answer: D

Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy.

What should you do?

A.
Access the Security Menu> API Reference > disable all API Access.
A.
Access the Security Menu> API Reference > disable all API Access.
Answers
B.
Access the Security Menu > API Permissions > choose Drive and Disable All Access.
B.
Access the Security Menu > API Permissions > choose Drive and Disable All Access.
Answers
C.
Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
C.
Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
Answers
D.
Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain.
D.
Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain.
Answers
Suggested answer: D

Explanation:

Reference: https://support.google.com/a/answer/60781?hl=en

How can you monitor increases in user reported Spam as identified by Google?

A.
Review post-delivery activity in the Email logs.
A.
Review post-delivery activity in the Email logs.
Answers
B.
Review user-reported spam in the Investigation Tool.
B.
Review user-reported spam in the Investigation Tool.
Answers
C.
Review spike in user-reported spam in the Alert center.
C.
Review spike in user-reported spam in the Alert center.
Answers
D.
Review post-delivery activity in the BigQuery Export.
D.
Review post-delivery activity in the BigQuery Export.
Answers
Suggested answer: C

With the help of a partner, you deployed Google Workspace last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things Google Workspace so that you can be prepared to take advantage of new features and ensure that your organization gets the most out of the platform.

What should you do?

A.
Develop a cadence of regular roadmap and business reviews with your partner.
A.
Develop a cadence of regular roadmap and business reviews with your partner.
Answers
B.
Regularly scan the admin console and keep track of any new features you identify.
B.
Regularly scan the admin console and keep track of any new features you identify.
Answers
C.
Create a Feature Release alert in the Alert Center to be alerted to new functionality.
C.
Create a Feature Release alert in the Alert Center to be alerted to new functionality.
Answers
D.
Put half of your organization on the Rapid Release Schedule to highlight differences.
D.
Put half of your organization on the Rapid Release Schedule to highlight differences.
Answers
Suggested answer: C

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.

What two actions should you take? (Choose two.)

A.
Configure objectionable content to reject messages with the words "wire transfer."
A.
Configure objectionable content to reject messages with the words "wire transfer."
Answers
B.
Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
B.
Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
Answers
C.
Create a rule requiring secure transport for all messages regarding wire transfers.
C.
Create a rule requiring secure transport for all messages regarding wire transfers.
Answers
D.
Add the sender of the wire transfer email to the blocked senders list.
D.
Add the sender of the wire transfer email to the blocked senders list.
Answers
E.
Enable all admin settings in Gmail's safety > spoofing and authentication.
E.
Enable all admin settings in Gmail's safety > spoofing and authentication.
Answers
Suggested answer: B, D

Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.

What security measures should you implement to secure data?

A.
Use Roles, Script, and Owner access permissions for operations on records and data relations.
A.
Use Roles, Script, and Owner access permissions for operations on records and data relations.
Answers
B.
Enable App Maker access only for the Finance department Organization Unit.
B.
Enable App Maker access only for the Finance department Organization Unit.
Answers
C.
Use a service account with limited permissions to access each data source.
C.
Use a service account with limited permissions to access each data source.
Answers
D.
Change owner access permissions to allow internal usage only.
D.
Change owner access permissions to allow internal usage only.
Answers
Suggested answer: A

Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward.

What should you do?

A.
Disable access to all "Other Services" in the Google Workspace Admin Console.
A.
Disable access to all "Other Services" in the Google Workspace Admin Console.
Answers
B.
Use the Transfer Tool for unmanaged accounts to invite users into the domain.
B.
Use the Transfer Tool for unmanaged accounts to invite users into the domain.
Answers
C.
Use the Data Migration Service to transfer the data to a managed account.
C.
Use the Data Migration Service to transfer the data to a managed account.
Answers
D.
Open a support ticket to have Google transfer unmanaged accounts into your domain.
D.
Open a support ticket to have Google transfer unmanaged accounts into your domain.
Answers
Suggested answer: C

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

A.
Review the authorized applications for each user via the Google Workspace Admin panel.
A.
Review the authorized applications for each user via the Google Workspace Admin panel.
Answers
B.
Create a survey via Google forms, and collect the application data from users.
B.
Create a survey via Google forms, and collect the application data from users.
Answers
C.
Review the token audit log, and compile a list of all the applications and their scopes.
C.
Review the token audit log, and compile a list of all the applications and their scopes.
Answers
D.
Review the API permissions installed apps list, and export the list.
D.
Review the API permissions installed apps list, and export the list.
Answers
Suggested answer: A

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active

Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data.

What two actions should you take? (Choose two.)

A.
Add the user's old email address to their account in the Google Workspace Admin panel.
A.
Add the user's old email address to their account in the Google Workspace Admin panel.
Answers
B.
Change the user's primary email address in the Google Workspace Admin panel.
B.
Change the user's primary email address in the Google Workspace Admin panel.
Answers
C.
Change the user's last name in the Google Workspace Admin panel.
C.
Change the user's last name in the Google Workspace Admin panel.
Answers
D.
Change the user's primary email in Active Directory.
D.
Change the user's primary email in Active Directory.
Answers
E.
Change the user's last name in Active Directory.
E.
Change the user's last name in Active Directory.
Answers
Suggested answer: A, C
Total 79 questions
Go to page: of 8