Google Professional Google Workspace Administrator Practice Test - Questions Answers, Page 14
List of questions
Question 131

The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?
Explanation:
To implement a scan of all incoming email attachments effectively, you should enable virtual execution of attachments in the security sandbox for the entire organization. This feature allows Google Workspace to execute attachments in a sandbox environment to detect malicious behavior before the email reaches the user's inbox. By applying this to the entire organization, you ensure that all users are protected regardless of their organizational unit.
Google Workspace Admin Help - Security Sandbox
Google Workspace Admin Help - Protect your organization from attachments with scripts
Question 132

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?
Explanation:
Automatic Room Replacement does not work on recurring events. This limitation means that if there is a conflict in room booking for a recurring event, the system will not automatically find a replacement room. This feature is designed to work only with single-instance events.
Google Workspace Admin Help - Set up automatic room replacement
Question 133

A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?
Explanation:
To securely share data using Google Vault for an investigation:
Suspend the user's account to prevent further changes to their data.
Use Google Vault to search for all associated user data relevant to the investigation.
Export the data securely from Google Vault. These steps ensure that the data remains intact and secure throughout the investigation process.
Google Workspace Admin Help - Export data from Google Vault
Google Workspace Admin Help - Manage user accounts
Question 134

A user has reported that they did not receive an email from one of their normal correspondents. What information do you need to collect from the user to investigate the cause of the issue?
Explanation:
To investigate the cause of a missing email, you need to collect:
The email address of the sender.
The subject of the missing message.
The date and time when the message was expected. This information allows you to search the email logs in the Admin console to track the email's journey and identify any issues that may have caused it to be delayed or not delivered.
Google Workspace Admin Help - Track email with email log search
Question 135

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?
Explanation:
To configure access for users such that they can add, edit, and move documents into the shared drive but not remove or delete files, you should add the users as Content Managers of the drive. Content Managers have permissions to organize and manage content, including adding and editing files, but they cannot delete files, which aligns with the team's request.
Google Workspace Admin Help - Shared drives access levels
Question 136

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?
Explanation:
To address the issue of users being locked out due to not setting up 2-Step Verification by the enforcement date, you should:
Move the affected users into an exception group temporarily.
Allow these users to sign in and set up 2-Step Verification.
Once the setup is confirmed and they can sign in successfully, remove them from the exception group.
This approach ensures that the users can complete the 2-Step Verification setup without compromising the overall security policies of the organization.
Google Workspace Admin Help: Enforce 2-Step Verification
Question 137

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?
Explanation:
To resolve the issue of meeting room availability and avoid new expenses:
Go to the Google Admin Console.
Navigate to Buildings and resources.
Select the appropriate building and rooms.
Enable the option 'Allow calendar-based room release' for all targeted rooms.
This option will automatically release rooms if no one checks in for the meeting, making them available for other users.
Google Workspace Updates Blog: Calendar-based room release
Question 138

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these new users, without updating the information of preexisting users?
Explanation:
To ensure new users receive emails from their previous domain without affecting existing users:
Add the acquired domain as a secondary domain to the primary Google Workspace domain.
Update the email information of all new users to include alias emails from the previous domain. This allows them to receive emails sent to their old addresses.
This method segregates the old and new user groups effectively and maintains the integrity of the email addresses.
Google Workspace Admin Help: Manage domains
Question 139

An administrator accidentally deleted several Workspace user accounts from the Google Admin Console two weeks ago. How can you recover the deleted user accounts?
Explanation:
To recover user accounts deleted two weeks ago:
Sign in to the Admin console as a Super Admin.
Navigate to user management.
Use the filter to select 'recently deleted' users.
Recover the deleted user accounts from the list.
Google Workspace allows recovery of deleted users within a 20-day window.
Google Workspace Admin Help: Restore a recently deleted user
Question 140

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?
Explanation:
To protect users from untrusted senders sending encrypted attachments:
Go to the Google Admin Console.
Navigate to Apps > Google Workspace > Gmail > Advanced settings.
Create a new safety rule that identifies messages with encrypted attachments from untrusted senders.
Configure the rule to send these messages to a quarantine instead of delivering them to users' mailboxes.
This measure ensures that potentially harmful emails are intercepted and reviewed before reaching the users.
Google Workspace Admin Help: Configure email safety settings
Question