ExamGecko
Home Home / Google / Professional Google Workspace Administrator

Google Professional Google Workspace Administrator Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?

A.
Configure a safety rule to protect against encrypted attachments from untrusted senders
A.
Configure a safety rule to protect against encrypted attachments from untrusted senders
Answers
B.
Configure a safety rule to protect against attachments with scripts from untrusted senders.
B.
Configure a safety rule to protect against attachments with scripts from untrusted senders.
Answers
C.
In the security sandbox section, enable virtual execution of attachments for (he targeted OU
C.
In the security sandbox section, enable virtual execution of attachments for (he targeted OU
Answers
D.
In the security sandbox section, enable virtual execution of attachments for the entire organization.
D.
In the security sandbox section, enable virtual execution of attachments for the entire organization.
Answers
Suggested answer: D

Explanation:

To implement a scan of all incoming email attachments effectively, you should enable virtual execution of attachments in the security sandbox for the entire organization. This feature allows Google Workspace to execute attachments in a sandbox environment to detect malicious behavior before the email reaches the user's inbox. By applying this to the entire organization, you ensure that all users are protected regardless of their organizational unit.

Google Workspace Admin Help - Security Sandbox

Google Workspace Admin Help - Protect your organization from attachments with scripts

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?

A.
Automatic Room Replacement does not work on recurring events.
A.
Automatic Room Replacement does not work on recurring events.
Answers
B.
This feature requires calendar event owners to have the Buildings and resources administrator privilege
B.
This feature requires calendar event owners to have the Buildings and resources administrator privilege
Answers
C.
The calendar resources do not have the Resource Category configured as CONFERENCE_ROOM
C.
The calendar resources do not have the Resource Category configured as CONFERENCE_ROOM
Answers
D.
The events have more than 20 attendees.
D.
The events have more than 20 attendees.
Answers
Suggested answer: A

Explanation:

Automatic Room Replacement does not work on recurring events. This limitation means that if there is a conflict in room booking for a recurring event, the system will not automatically find a replacement room. This feature is designed to work only with single-instance events.

Google Workspace Admin Help - Set up automatic room replacement

A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?

A.
Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.
A.
Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.
Answers
B.
Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.
B.
Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.
Answers
C.
Immediately suspend the user's account, assign an archived user license, and export data.
C.
Immediately suspend the user's account, assign an archived user license, and export data.
Answers
D.
Suspend the user's account, search all associated users data in Google Vault, and export the data.
D.
Suspend the user's account, search all associated users data in Google Vault, and export the data.
Answers
Suggested answer: D

Explanation:

To securely share data using Google Vault for an investigation:

Suspend the user's account to prevent further changes to their data.

Use Google Vault to search for all associated user data relevant to the investigation.

Export the data securely from Google Vault. These steps ensure that the data remains intact and secure throughout the investigation process.

Google Workspace Admin Help - Export data from Google Vault

Google Workspace Admin Help - Manage user accounts

A user has reported that they did not receive an email from one of their normal correspondents. What information do you need to collect from the user to investigate the cause of the issue?

A.
The email address of the sender and the subject and date/time of the missing message.
A.
The email address of the sender and the subject and date/time of the missing message.
Answers
B.
The type of device the individual is using, including the OS version, browser, and browser version.
B.
The type of device the individual is using, including the OS version, browser, and browser version.
Answers
C.
The sender's domain so you can review their SPF and DKIM configuration.
C.
The sender's domain so you can review their SPF and DKIM configuration.
Answers
D.
The sender's IP address, mail client, and mail platform.
D.
The sender's IP address, mail client, and mail platform.
Answers
Suggested answer: A

Explanation:

To investigate the cause of a missing email, you need to collect:

The email address of the sender.

The subject of the missing message.

The date and time when the message was expected. This information allows you to search the email logs in the Admin console to track the email's journey and identify any issues that may have caused it to be delayed or not delivered.

Google Workspace Admin Help - Track email with email log search

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?

A.
Set up the shared drive, and add the users as Content Managers of the drive.
A.
Set up the shared drive, and add the users as Content Managers of the drive.
Answers
B.
Set up the shared drive, and add the users as editors of the drive.
B.
Set up the shared drive, and add the users as editors of the drive.
Answers
C.
Set up the shared drive, and add the users as Contributors of the drive.
C.
Set up the shared drive, and add the users as Contributors of the drive.
Answers
D.
Set up the shared drive, and add the users as Managers of the drive.
D.
Set up the shared drive, and add the users as Managers of the drive.
Answers
Suggested answer: A

Explanation:

To configure access for users such that they can add, edit, and move documents into the shared drive but not remove or delete files, you should add the users as Content Managers of the drive. Content Managers have permissions to organize and manage content, including adding and editing files, but they cannot delete files, which aligns with the team's request.

Google Workspace Admin Help - Shared drives access levels

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?

A.
Disable 2-Step Verification per organizational unit so the affected users can sign in.
A.
Disable 2-Step Verification per organizational unit so the affected users can sign in.
Answers
B.
Move the affected users into the exception group temporarily so they can set up 2-Step Verification, and then remove them from the exception group after successful sign-in is confirmed.
B.
Move the affected users into the exception group temporarily so they can set up 2-Step Verification, and then remove them from the exception group after successful sign-in is confirmed.
Answers
C.
Disable 2-Step Verification organization-wide so all users can successfully sign in.
C.
Disable 2-Step Verification organization-wide so all users can successfully sign in.
Answers
D.
Move the affected users into the exception group permanently so they do not have to use 2-Step Verification going forward.
D.
Move the affected users into the exception group permanently so they do not have to use 2-Step Verification going forward.
Answers
Suggested answer: B

Explanation:

To address the issue of users being locked out due to not setting up 2-Step Verification by the enforcement date, you should:

Move the affected users into an exception group temporarily.

Allow these users to sign in and set up 2-Step Verification.

Once the setup is confirmed and they can sign in successfully, remove them from the exception group.

This approach ensures that the users can complete the 2-Step Verification setup without compromising the overall security policies of the organization.

Google Workspace Admin Help: Enforce 2-Step Verification

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?

A.
Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.
A.
Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.
Answers
B.
Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.
B.
Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.
Answers
C.
Set the option 'Allow calendar-based room release' for all targeted rooms.
C.
Set the option 'Allow calendar-based room release' for all targeted rooms.
Answers
D.
Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.
D.
Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.
Answers
Suggested answer: C

Explanation:

To resolve the issue of meeting room availability and avoid new expenses:

Go to the Google Admin Console.

Navigate to Buildings and resources.

Select the appropriate building and rooms.

Enable the option 'Allow calendar-based room release' for all targeted rooms.

This option will automatically release rooms if no one checks in for the meeting, making them available for other users.

Google Workspace Updates Blog: Calendar-based room release

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these new users, without updating the information of preexisting users?

A.
Add the acquired domain as an alias to the primary Google Workspace domain.
A.
Add the acquired domain as an alias to the primary Google Workspace domain.
Answers
B.
Add the acquired domain as a secondary domain to the primary Google Workspace domain, and then update the email information of all new users with alias emails.
B.
Add the acquired domain as a secondary domain to the primary Google Workspace domain, and then update the email information of all new users with alias emails.
Answers
C.
Update the Google-provided test domain to be the domain of the acquired company, and then update the email information of all new users with alias emails.
C.
Update the Google-provided test domain to be the domain of the acquired company, and then update the email information of all new users with alias emails.
Answers
D.
Without adding a domain, update each user's email information with the previous domain.
D.
Without adding a domain, update each user's email information with the previous domain.
Answers
Suggested answer: B

Explanation:

To ensure new users receive emails from their previous domain without affecting existing users:

Add the acquired domain as a secondary domain to the primary Google Workspace domain.

Update the email information of all new users to include alias emails from the previous domain. This allows them to receive emails sent to their old addresses.

This method segregates the old and new user groups effectively and maintains the integrity of the email addresses.

Google Workspace Admin Help: Manage domains

An administrator accidentally deleted several Workspace user accounts from the Google Admin Console two weeks ago. How can you recover the deleted user accounts?

A.
Open a Google support ticket, and request a recovery of all recently deleted users.
A.
Open a Google support ticket, and request a recovery of all recently deleted users.
Answers
B.
Sign in to the Admin console as Help Desk Admin, open user management, filter for 'recently deleted.' and recover.
B.
Sign in to the Admin console as Help Desk Admin, open user management, filter for 'recently deleted.' and recover.
Answers
C.
Sign in to the Admin console as Super Admin, open user management, filter for 'recently deleted.' and recover.
C.
Sign in to the Admin console as Super Admin, open user management, filter for 'recently deleted.' and recover.
Answers
D.
Create a matter, go to legal hold, and create a legal hold for the user accounts.
D.
Create a matter, go to legal hold, and create a legal hold for the user accounts.
Answers
Suggested answer: C

Explanation:

To recover user accounts deleted two weeks ago:

Sign in to the Admin console as a Super Admin.

Navigate to user management.

Use the filter to select 'recently deleted' users.

Recover the deleted user accounts from the list.

Google Workspace allows recovery of deleted users within a 20-day window.

Google Workspace Admin Help: Restore a recently deleted user

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?

A.
Use the security center to remove the messages from users' mailboxes
A.
Use the security center to remove the messages from users' mailboxes
Answers
B.
Use Google Vault to remove these messages from users mailboxes.
B.
Use Google Vault to remove these messages from users mailboxes.
Answers
C.
Enable a safety rule to send these types of messages to spam.
C.
Enable a safety rule to send these types of messages to spam.
Answers
D.
Enable a safety rule to send these types of messages to a quarantine.
D.
Enable a safety rule to send these types of messages to a quarantine.
Answers
Suggested answer: D

Explanation:

To protect users from untrusted senders sending encrypted attachments:

Go to the Google Admin Console.

Navigate to Apps > Google Workspace > Gmail > Advanced settings.

Create a new safety rule that identifies messages with encrypted attachments from untrusted senders.

Configure the rule to send these messages to a quarantine instead of delivering them to users' mailboxes.

This measure ensures that potentially harmful emails are intercepted and reviewed before reaching the users.

Google Workspace Admin Help: Configure email safety settings

Total 197 questions
Go to page: of 20