ExamGecko
Home Home / Google / Professional Google Workspace Administrator

Google Professional Google Workspace Administrator Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Your organization is expected to start using Google Workspace Enterprise Standard in several countries. During the planning phase, the change management leadership team mandates that meeting rooms near each participant's office location should be suggested when someone creates a Google Calendar event, to simplify the user experience and avoid booking rooms when people would not be able to move easily. What should you do?

A.
Organize users for each location in separate organizational units (OUs). Add room resources to the corresponding OUs so that meeting rooms would be suggested accordingly.
A.
Organize users for each location in separate organizational units (OUs). Add room resources to the corresponding OUs so that meeting rooms would be suggested accordingly.
Answers
B.
Organize users for each location in separate Google Groups. Add room resources to the corresponding groups so that meeting rooms would be suggested accordingly.
B.
Organize users for each location in separate Google Groups. Add room resources to the corresponding groups so that meeting rooms would be suggested accordingly.
Answers
C.
Share each room only with the Dynamic Group defined per each user location so that they can only book the rooms nearby.
C.
Share each room only with the Dynamic Group defined per each user location so that they can only book the rooms nearby.
Answers
D.
Define users' work locations by setting building ID. floor name, and floor section if applicable as the-buildings and rooms are defined.
D.
Define users' work locations by setting building ID. floor name, and floor section if applicable as the-buildings and rooms are defined.
Answers
Suggested answer: D

Explanation:

Navigate to Google Admin Console: Go to admin.google.com and sign in with your admin account.

Access Buildings and Resources: In the Admin console, go to Menu > Directory > Buildings and resources.

Create Buildings and Rooms: Create buildings and define floors and sections within these buildings. Each building should represent an office location.

Set Users' Work Locations: Assign building ID, floor name, and floor section to users. This can be done manually for each user or in bulk using a CSV file upload.

Configure Calendar Settings: Ensure that the Google Calendar settings are configured to suggest nearby meeting rooms based on users' work locations.

This setup allows Google Calendar to suggest meeting rooms near the users' defined work locations, improving the user experience and avoiding the booking of inconvenient rooms.

Manage buildings, features & resources

Set up work locations

The security team for your organization is concerned about phishlng attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks?

Choose 2 answers

A.
Configure spoofing and authentication controls to quarantine messages that are perceived as threats
A.
Configure spoofing and authentication controls to quarantine messages that are perceived as threats
Answers
B.
Train end users to mark messages as spam when they see something suspicious.
B.
Train end users to mark messages as spam when they see something suspicious.
Answers
C.
Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.
C.
Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.
Answers
D.
Enforce confidents mode for all messages sent and received from your Workspace domain
D.
Enforce confidents mode for all messages sent and received from your Workspace domain
Answers
E.
Force encryption on all inbound and outbound emails from your Workspace domain.
E.
Force encryption on all inbound and outbound emails from your Workspace domain.
Answers
Suggested answer: A, C

Explanation:

Access Admin Console: Go to admin.google.com and sign in with your admin account.

Navigate to Gmail Settings: In the Admin console, go to Apps > Google Workspace > Gmail > Safety.

Configure Spoofing and Authentication Controls:

Set up email authentication policies such as SPF, DKIM, and DMARC to verify incoming emails.

Enable options to quarantine messages that fail authentication checks and are perceived as threats.

Configure warnings for users to alert them about potentially harmful messages.

Create Compliance Rules: Under the Gmail settings, create rules that quarantine suspicious emails and notify users when they receive messages that might be phishing attempts.

Train Users: Educate users on how to recognize phishing attempts and the importance of marking suspicious emails as spam.

By configuring these settings, you enhance the security against phishing attacks by both automatically handling suspected threats and making users aware of potential dangers.

Protect against spam and phishing with Gmail

Set up email authentication (SPF, DKIM, DMARC)

Your company is using macOS devices for all employees and has built a process to allow a Google account to be used as credentials (or the device Your company wants to manage newly acquired Windows 10 devices with Google Workspace endpoint management and have employees use their Google Workspace account as login credentials for Windows 10 Which steps should you take to enable this?

Choose 2 answers

A.
Install and configure Google Credential Provider for Windows (GCPW) on each device
A.
Install and configure Google Credential Provider for Windows (GCPW) on each device
Answers
B.
Configure Chrome policies on Windows to push advanced device management policies
B.
Configure Chrome policies on Windows to push advanced device management policies
Answers
C.
Enable Windows device management in Devices > Mobile & endpoints > Settings > Windows settings
C.
Enable Windows device management in Devices > Mobile & endpoints > Settings > Windows settings
Answers
D.
Sync the Google Accounts and password to AD via Google Cloud Directory Sync V1 (GCDS)
D.
Sync the Google Accounts and password to AD via Google Cloud Directory Sync V1 (GCDS)
Answers
E.
Install and configure Password Sync on each Active Directory (AD) domain controller
E.
Install and configure Password Sync on each Active Directory (AD) domain controller
Answers
Suggested answer: A, C

Explanation:

Install GCPW on Windows Devices:

Download the Google Credential Provider for Windows (GCPW) from Google's official site.

Install GCPW on each Windows device.

Configure GCPW to allow users to sign in using their Google Workspace credentials.

Enable Windows Device Management:

Go to admin.google.com and sign in with your admin account.

Navigate to Devices > Mobile & endpoints > Settings > Windows settings.

Enable Windows device management to allow Google Workspace to manage the Windows 10 devices.

Configure Settings and Policies:

Apply necessary device policies and settings through the Admin console to ensure security and compliance.

User Login:

Users can now use their Google Workspace credentials to log into their Windows 10 devices, and the devices will be managed via Google Workspace endpoint management.

This setup integrates Windows 10 devices with Google Workspace for unified credential management and device policy enforcement.

Set up Google Credential Provider for Windows (GCPW)

Set up and manage Windows devices

A user does not follow their sign-in pattern and signs In from an unusual location As an admin, what should you do in response to this alert for this user during this investigation?

A.
Add Two Factor Authentication to the Domain
A.
Add Two Factor Authentication to the Domain
Answers
B.
First suspend the account and then investigate
B.
First suspend the account and then investigate
Answers
C.
Enhance your security alerts for tracking sign-in patterns
C.
Enhance your security alerts for tracking sign-in patterns
Answers
D.
Investigate the account for unauthorized activity in the Login and Security Audit Log
D.
Investigate the account for unauthorized activity in the Login and Security Audit Log
Answers
Suggested answer: D

Explanation:

Access Admin Console: Go to admin.google.com and sign in with your admin account.

Navigate to Reports: In the Admin console, go to Reports > Audit > Login.

Review Login Activity: Look for any unusual or suspicious login attempts, such as logins from unknown IP addresses or locations.

Investigate Further:

Check the user's activity for any signs of unauthorized access or unusual behavior.

Use the Security Audit Log to find more details about the login attempts and other security events.

Take Appropriate Actions:

If unauthorized activity is confirmed, consider resetting the user's password and enabling two-factor authentication (2FA).

Notify the user and possibly suspend the account if the threat level is high until the issue is resolved.

By investigating the login and security logs, you can identify and mitigate potential security threats effectively.

View and analyze security reports and logs

Audit and investigation page

Users in your organization are routinely complaining that they receive messages containing words of profanity they find inappropriate in a professional setting. As the administrator what steps should you take to prevent the messages from being delivered to users mailboxes?

A.
Configure an objectionable content rule
A.
Configure an objectionable content rule
Answers
B.
Configure an attachment compliance rule
B.
Configure an attachment compliance rule
Answers
C.
Enable optical character recognition (OCR)
C.
Enable optical character recognition (OCR)
Answers
D.
Set up a Gmail DLP policy.
D.
Set up a Gmail DLP policy.
Answers
Suggested answer: A

Explanation:

To prevent messages containing profanity from being delivered to users' mailboxes, follow these steps:

Sign in to the Google Admin console: Use an account with super administrator privileges.

Navigate to the Gmail settings: Go to Apps > Google Workspace > Gmail > Manage settings.

Create a new content compliance rule:

Click on 'Compliance' and then 'Content compliance.'

Click on 'Add another rule.'

Provide a name for the rule, such as 'Profanity Filter.'

Set the conditions for the rule:

In the 'Add setting' section, choose 'If ANY of the following match the message.'

Select 'Metadata match' or 'Advanced content match.'

For 'Advanced content match,' use predefined content filters or add custom words that are considered profane.

Configure the actions:

Set the action to 'Reject message' or 'Quarantine message.'

Optionally, you can notify an administrator or sender about the rejection or quarantine.

Save the rule: Click on 'Save' to activate the rule.

Google Workspace Admin Help - Configure content compliance

Google Workspace Admin Help - Objectionable content

Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What steps should you take from the admin panel to preventusers from copying data from work to personal apps on iOS devices? (Choose Two)

A.
Clear the 'allow users to copy data to personal apps' checkbox.
A.
Clear the 'allow users to copy data to personal apps' checkbox.
Answers
B.
Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Data Protection Turn on 'Advanced Mobile Management.'
B.
Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Data Protection Turn on 'Advanced Mobile Management.'
Answers
C.
Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Open Docs in Unmanaged Apps
C.
Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Open Docs in Unmanaged Apps
Answers
D.
Clear the 'allow items created with managed apps to open in unmanaged apps' checkbox.
D.
Clear the 'allow items created with managed apps to open in unmanaged apps' checkbox.
Answers
Suggested answer: A, B

Explanation:

Google Workspace Admin Help - Manage iOS settings

Google Workspace Admin Help - Advanced mobile device management

To prevent users from copying content from a Google app in their work account to a personal account or third-party app on iOS devices, follow these steps: Sign in to the Google Admin console: Use an account with super administrator privileges. Navigate to Mobile and endpoint management: Go to Devices > Mobile and endpoints > Settings > iOS settings. Data sharing settings: In the iOS settings, go to 'Data Sharing.' Under 'Data Protection,' clear the checkbox for 'Allow users to copy data to personal apps.' This ensures that data cannot be copied from managed Google apps to unmanaged personal apps. Enable Advanced Mobile Management: Navigate to Devices > Mobile and endpoint management. Turn on 'Advanced Mobile Management' to enforce the data protection policies on iOS devices.

You are the administrator of a domain that requires iOS mobile device management. What initial steps should be taken to ensure that you can properly manage end-user iOS devices?

A.
Follow the prompts under 'company owned devices,' and select 'iOS Management.' Select the option to 'enforce management on iOS devices.'
A.
Follow the prompts under 'company owned devices,' and select 'iOS Management.' Select the option to 'enforce management on iOS devices.'
Answers
B.
Configure an Apple Push Certificate, and select 'certificate never expires.'
B.
Configure an Apple Push Certificate, and select 'certificate never expires.'
Answers
C.
Configure an Apple Push Certificate, and be sure to use a work address that can be accessed in the future.
C.
Configure an Apple Push Certificate, and be sure to use a work address that can be accessed in the future.
Answers
D.
In the Admin console, navigate to iOS management, and enable the Apple Push Certificate connector.
D.
In the Admin console, navigate to iOS management, and enable the Apple Push Certificate connector.
Answers
Suggested answer: C

Explanation:

To ensure proper management of iOS devices, follow these steps:

Sign in to the Google Admin console: Use an account with super administrator privileges.

Navigate to Device Management: Go to Devices > Mobile and endpoints > Settings > iOS settings.

Configure Apple Push Certificate:

Click on 'Apple Push Certificate.'

Follow the instructions to create and upload an Apple Push Certificate. Ensure that you use a work email address that will be accessible in the future for renewal purposes.

Enable iOS Management:

Once the Apple Push Certificate is configured, enable iOS device management.

Optionally, enforce management on iOS devices to ensure all devices are compliant.

Google Workspace Admin Help - Set up Apple Push Certificate

Google Workspace Admin Help - Manage iOS devices

Your executive team has asked you to export all available data for 1,200 of your 1,500 Google Workspace Domain users. How should you proceed to export the data with the least amount of effort?

A.
Perform a search in Google Vault for the 500 users and export all of the results.
A.
Perform a search in Google Vault for the 500 users and export all of the results.
Answers
B.
Create a shared drive for the exports. Instruct end users to manually use Google Takeout to export the data and place the exported files in the shared drive.
B.
Create a shared drive for the exports. Instruct end users to manually use Google Takeout to export the data and place the exported files in the shared drive.
Answers
C.
Contact Google Cloud support to perform the export for you.
C.
Contact Google Cloud support to perform the export for you.
Answers
D.
Contact Google Cloud Support to enable the Data Export tool for your organization, because you have more than 1,000 users, then use the tool to export data for the domain, and remove any unnecessary user data.
D.
Contact Google Cloud Support to enable the Data Export tool for your organization, because you have more than 1,000 users, then use the tool to export data for the domain, and remove any unnecessary user data.
Answers
Suggested answer: D

Explanation:

To export data for a large number of users efficiently, follow these steps:

Contact Google Cloud Support: Since your organization has more than 1,000 users, you need to request access to the Data Export tool. This tool is not automatically available for large domains.

Enable the Data Export tool: Google Cloud Support will enable the tool for your organization.

Use the Data Export tool:

Once enabled, sign in to the Google Admin console with super administrator privileges.

Navigate to the Data Export tool under Tools.

Initiate the export process, selecting the data for the 1,200 users.

Manage the exported data: After the export is complete, review the data and remove any unnecessary user data to streamline the results.

Google Workspace Admin Help - Data Export

Google Workspace Admin Help - Contact support

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching in preparation for the risk assessment you want to quickly review all the security-related settings for Gmail, Drive and Calendar and identify the ones that may be posing risk What should you do?

A.
Review all the alerts in the Alert center
A.
Review all the alerts in the Alert center
Answers
B.
Review the Security health page in the Admin console
B.
Review the Security health page in the Admin console
Answers
C.
Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps
C.
Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps
Answers
D.
Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.
D.
Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.
Answers
Suggested answer: B

Explanation:

Access Admin Console: Log in to the Google Admin console using your administrator account.

Navigate to Security Health Page: In the Admin console, go to the Security section and select Security health. This page provides a comprehensive overview of your organization's security settings.

Review Security Settings: The Security health page lists various security settings for Gmail, Drive, and Calendar. It highlights settings that might pose a risk and provides recommendations for improvement.

Identify and Mitigate Risks: Carefully review the highlighted settings. Follow the recommendations to enhance your organization's security posture. This ensures that any potential risks are identified and mitigated promptly.

Google Workspace Admin Help: Security health

Google Workspace Security Best Practices

Your organization has a data loss prevention (DLP) rule to detect and warn users about external sharing of sensitive files in Google Drive You also want to prevent external users from downloading files with viewer permissions to their local machines What should you do?

A.
Do nothing. View-only Drive files automatically prevent the user from downloading the files
A.
Do nothing. View-only Drive files automatically prevent the user from downloading the files
Answers
B.
Modify the existing DLP rule to Disable download, print, and copy for commenters and viewers
B.
Modify the existing DLP rule to Disable download, print, and copy for commenters and viewers
Answers
C.
Create a new DLP rule by using the existing content detector conditions but change the action for the new rule to Disable download. print, and copy for commenters and viewers
C.
Create a new DLP rule by using the existing content detector conditions but change the action for the new rule to Disable download. print, and copy for commenters and viewers
Answers
D.
Create a new DLP rule and set the scope to the organizational unit or group that you want to restrict
D.
Create a new DLP rule and set the scope to the organizational unit or group that you want to restrict
Answers
Suggested answer: C

Explanation:

Access Admin Console: Log in to the Google Admin console using your administrator account.

Navigate to DLP Rules: Go to Apps > Google Workspace > Drive and Docs > Data loss prevention.

Create a New Rule: Click on Create a rule and choose to start with a template or create a custom rule.

Set Content Detector Conditions: Use the existing content detector conditions that identify sensitive files.

Configure Actions: Set the action to Disable download, print, and copy for commenters and viewers. This ensures that external users with viewer permissions cannot download the files.

Apply Rule to Relevant OUs/Groups: Set the scope of the rule to the specific organizational units or groups where you want this restriction to apply.

Save and Implement: Save the rule and ensure it is activated. This will enforce the new restrictions for sensitive files shared externally.

Google Workspace Admin Help: Data loss prevention for Drive

Google Workspace DLP Best Practices

Total 197 questions
Go to page: of 20