ExamGecko
Ask Question

Google Professional Collaboration Engineer Practice Test - Questions Answers, Page 6

List of questions

Question 51

Report
Export
Collapse

Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request.

What should you do?

Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
Suggested answer: D
asked 18/09/2024
Babatunde Ipaye
40 questions

Question 52

Report
Export
Collapse

Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification.

You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

Enable Enforce Strong Password policy.
Enable Enforce Strong Password policy.
Enable Employee ID Login Challenge.
Enable Employee ID Login Challenge.
Decrease the Maximum User Session Length.
Decrease the Maximum User Session Length.
Revoke token authorizations to external applications.
Revoke token authorizations to external applications.
Suggested answer: D
asked 18/09/2024
Nguyen Tan Hung
49 questions

Question 53

Report
Export
Collapse

Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy.

What should you do?

Access the Security Menu> API Reference > disable all API Access.
Access the Security Menu> API Reference > disable all API Access.
Access the Security Menu > API Permissions > choose Drive and Disable All Access.
Access the Security Menu > API Permissions > choose Drive and Disable All Access.
Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain.
Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain.
Suggested answer: D

Explanation:

Reference: https://support.google.com/a/answer/60781?hl=en

asked 18/09/2024
david tsai
44 questions

Question 54

Report
Export
Collapse

How can you monitor increases in user reported Spam as identified by Google?

Review post-delivery activity in the Email logs.
Review post-delivery activity in the Email logs.
Review user-reported spam in the Investigation Tool.
Review user-reported spam in the Investigation Tool.
Review spike in user-reported spam in the Alert center.
Review spike in user-reported spam in the Alert center.
Review post-delivery activity in the BigQuery Export.
Review post-delivery activity in the BigQuery Export.
Suggested answer: C
asked 18/09/2024
Saptarshi Biswas
32 questions

Question 55

Report
Export
Collapse

With the help of a partner, you deployed Google Workspace last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things Google Workspace so that you can be prepared to take advantage of new features and ensure that your organization gets the most out of the platform.

What should you do?

Develop a cadence of regular roadmap and business reviews with your partner.
Develop a cadence of regular roadmap and business reviews with your partner.
Regularly scan the admin console and keep track of any new features you identify.
Regularly scan the admin console and keep track of any new features you identify.
Create a Feature Release alert in the Alert Center to be alerted to new functionality.
Create a Feature Release alert in the Alert Center to be alerted to new functionality.
Put half of your organization on the Rapid Release Schedule to highlight differences.
Put half of your organization on the Rapid Release Schedule to highlight differences.
Suggested answer: C
asked 18/09/2024
Steven Bertoldi
28 questions

Question 56

Report
Export
Collapse

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.

What two actions should you take? (Choose two.)

Configure objectionable content to reject messages with the words "wire transfer."
Configure objectionable content to reject messages with the words "wire transfer."
Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
Create a rule requiring secure transport for all messages regarding wire transfers.
Create a rule requiring secure transport for all messages regarding wire transfers.
Add the sender of the wire transfer email to the blocked senders list.
Add the sender of the wire transfer email to the blocked senders list.
Enable all admin settings in Gmail's safety > spoofing and authentication.
Enable all admin settings in Gmail's safety > spoofing and authentication.
Suggested answer: B, D
asked 18/09/2024
Susan Brady
47 questions

Question 57

Report
Export
Collapse

Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.

What security measures should you implement to secure data?

Use Roles, Script, and Owner access permissions for operations on records and data relations.
Use Roles, Script, and Owner access permissions for operations on records and data relations.
Enable App Maker access only for the Finance department Organization Unit.
Enable App Maker access only for the Finance department Organization Unit.
Use a service account with limited permissions to access each data source.
Use a service account with limited permissions to access each data source.
Change owner access permissions to allow internal usage only.
Change owner access permissions to allow internal usage only.
Suggested answer: A
asked 18/09/2024
Arvee Natividad
38 questions

Question 58

Report
Export
Collapse

Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward.

What should you do?

Disable access to all "Other Services" in the Google Workspace Admin Console.
Disable access to all "Other Services" in the Google Workspace Admin Console.
Use the Transfer Tool for unmanaged accounts to invite users into the domain.
Use the Transfer Tool for unmanaged accounts to invite users into the domain.
Use the Data Migration Service to transfer the data to a managed account.
Use the Data Migration Service to transfer the data to a managed account.
Open a support ticket to have Google transfer unmanaged accounts into your domain.
Open a support ticket to have Google transfer unmanaged accounts into your domain.
Suggested answer: C
asked 18/09/2024
Shane Behrendt
35 questions

Question 59

Report
Export
Collapse

Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report
Export
Collapse

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active

Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data.

What two actions should you take? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member
Total 79 questions
Go to page: of 8
Search

Related questions