ExamGecko
Home Home / Google / Professional Collaboration Engineer

Google Professional Collaboration Engineer Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Question 51

Report
Export
Collapse

Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request.

What should you do?

A.
Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
A.
Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Answers
B.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
B.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
Answers
C.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
C.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Answers
D.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
D.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
Answers
Suggested answer: D
asked 18/09/2024
Babatunde Ipaye
40 questions

Question 52

Report
Export
Collapse

Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification.

You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

A.
Enable Enforce Strong Password policy.
A.
Enable Enforce Strong Password policy.
Answers
B.
Enable Employee ID Login Challenge.
B.
Enable Employee ID Login Challenge.
Answers
C.
Decrease the Maximum User Session Length.
C.
Decrease the Maximum User Session Length.
Answers
D.
Revoke token authorizations to external applications.
D.
Revoke token authorizations to external applications.
Answers
Suggested answer: D
asked 18/09/2024
Nguyen Tan Hung
49 questions

Question 53

Report
Export
Collapse

Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy.

What should you do?

A.
Access the Security Menu> API Reference > disable all API Access.
A.
Access the Security Menu> API Reference > disable all API Access.
Answers
B.
Access the Security Menu > API Permissions > choose Drive and Disable All Access.
B.
Access the Security Menu > API Permissions > choose Drive and Disable All Access.
Answers
C.
Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
C.
Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
Answers
D.
Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain.
D.
Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain.
Answers
Suggested answer: D

Explanation:

Reference: https://support.google.com/a/answer/60781?hl=en

asked 18/09/2024
david tsai
44 questions

Question 54

Report
Export
Collapse

How can you monitor increases in user reported Spam as identified by Google?

A.
Review post-delivery activity in the Email logs.
A.
Review post-delivery activity in the Email logs.
Answers
B.
Review user-reported spam in the Investigation Tool.
B.
Review user-reported spam in the Investigation Tool.
Answers
C.
Review spike in user-reported spam in the Alert center.
C.
Review spike in user-reported spam in the Alert center.
Answers
D.
Review post-delivery activity in the BigQuery Export.
D.
Review post-delivery activity in the BigQuery Export.
Answers
Suggested answer: C
asked 18/09/2024
Saptarshi Biswas
32 questions

Question 55

Report
Export
Collapse

With the help of a partner, you deployed Google Workspace last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things Google Workspace so that you can be prepared to take advantage of new features and ensure that your organization gets the most out of the platform.

What should you do?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 56

Report
Export
Collapse

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.

What two actions should you take? (Choose two.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 57

Report
Export
Collapse

Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.

What security measures should you implement to secure data?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 58

Report
Export
Collapse

Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward.

What should you do?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 59

Report
Export
Collapse

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 60

Report
Export
Collapse

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active

Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data.

What two actions should you take? (Choose two.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 79 questions
Go to page: of 8