ExamGecko
Home Home / Google / Professional Google Workspace Administrator

Google Professional Google Workspace Administrator Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Your organization wants more visibility into actions taken by Google staff related to your data for audit and security reasons. They are specifically interested in understanding the actions performed by Google support staff with regard to the support cases you have opened with Google. What should you do to gain more visibility?

A.
From Google Admin Panel, go to Audit, and select Access Transparency Logs. Most Voted
A.
From Google Admin Panel, go to Audit, and select Access Transparency Logs. Most Voted
Answers
B.
From Google Admin Panel, go to Audit, and select Login Audit Log.
B.
From Google Admin Panel, go to Audit, and select Login Audit Log.
Answers
C.
From Google Admin Panel, go to Audit, and select Rules Audit Log.
C.
From Google Admin Panel, go to Audit, and select Rules Audit Log.
Answers
D.
From Google Admin Panel, go to Audit, and select Admin Audit Log.
D.
From Google Admin Panel, go to Audit, and select Admin Audit Log.
Answers
Suggested answer: A

Explanation:

Access Admin Console: Log into your Google Workspace Admin Console.

Navigate to Audit Logs: Go to Reports > Audit > Access Transparency Logs.

View Logs: In the Access Transparency Logs, you can see the actions performed by Google staff on your data.

Monitor Actions: Review the logs to understand the actions taken by Google support staff in relation to your support cases.

Google Support: Access Transparency

Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail. What should you do to protect your users from future unknown malware in email attachments?

A.
Run queries in Security Investigation Tool.
A.
Run queries in Security Investigation Tool.
Answers
B.
Turn on advanced phishing and malware protection.
B.
Turn on advanced phishing and malware protection.
Answers
C.
Enable Security Sandbox.
C.
Enable Security Sandbox.
Answers
D.
Enable Gmail confidential mode.
D.
Enable Gmail confidential mode.
Answers
Suggested answer: C

Explanation:

Access Admin Console: Log into your Google Workspace Admin Console.

Navigate to Security Settings: Go to Security > Gmail > Safety.

Enable Security Sandbox: Locate the 'Security Sandbox' setting and enable it. Security Sandbox provides an additional layer of protection by analyzing attachments for malware in a controlled environment before they reach users.

Save Settings: Save the changes to ensure the new protection layer is active.

Google Support: Gmail security sandbox

Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?

A.
Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is [email protected].
A.
Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is [email protected].
Answers
B.
Have the super administrator use the Security API to audit Drive access.
B.
Have the super administrator use the Security API to audit Drive access.
Answers
C.
As a super administrator, change the access on externally shared Drive files manually under [email protected].
C.
As a super administrator, change the access on externally shared Drive files manually under [email protected].
Answers
D.
Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for [email protected].
D.
Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for [email protected].
Answers
Suggested answer: A

Explanation:

To audit if [email protected] has shared any sensitive documents outside the organization, use the Security Investigation Tool in the Google Admin console. This tool allows administrators to investigate and take action on security issues within the organization.

Open Security Investigation Tool:

Go to the Google Admin console.

Navigate to Security > Investigation tool.

Set Conditions in Drive Log Events:

In the Investigation Tool, select the data source as 'Drive Log Events'.

Add the following conditions:

Visibility Is External: This filters the events to show only documents that have been shared externally.

Actor Is [email protected]: This specifies that the actions performed by the [email protected] should be displayed.

Run the Investigation:

Click on ''Search'' to run the investigation with the specified conditions.

Review the results to identify any documents that have been shared externally by the user.

Remediate:

For any documents that were shared inappropriately, you can take corrective actions such as changing permissions or removing external sharing.

Security Investigation Tool

Audit Drive log events

A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam. What steps should the admin take to prevent this behavior in the future?

A.
Modify the SPF record for your internal domain to include the IPs of the external user's mail servers.
A.
Modify the SPF record for your internal domain to include the IPs of the external user's mail servers.
Answers
B.
Update the spam settings in the Admin Console to be less aggressive.
B.
Update the spam settings in the Admin Console to be less aggressive.
Answers
C.
Add the sender's domain to an allowlist via approved senders in the Admin Console.
C.
Add the sender's domain to an allowlist via approved senders in the Admin Console.
Answers
D.
Instruct the user to add the senders to their contacts.
D.
Instruct the user to add the senders to their contacts.
Answers
Suggested answer: C

Explanation:

To prevent external, inbound messages from known senders from being incorrectly classified as spam, add the sender's domain to an allowlist in the Admin console.

Access Gmail Settings in Admin Console:

Go to the Google Admin console.

Navigate to Apps > Google Workspace > Gmail > Spam, Phishing, and Malware.

Add Approved Senders:

In the Spam settings, find the section for ''Email whitelist'' or ''Approved senders''.

Click on ''Configure'' to add a new entry.

Specify the Sender's Domain:

Enter the domain of the external sender that needs to be allowed.

Save the changes to update the whitelist.

Verify and Monitor:

Ensure that the settings are applied and monitor the spam filter to confirm that the known sender's emails are no longer being flagged as spam.

By adding the sender's domain to an allowlist, you instruct the spam filter to accept emails from this domain, reducing false positives.

Prevent mail from being marked as spam

Approved sender list in Gmail

You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location. How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?

A.
Configure a data region at the top level OU of your organization, and set the value to ''Europe''.
A.
Configure a data region at the top level OU of your organization, and set the value to ''Europe''.
Answers
B.
Add three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.
B.
Add three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.
Answers
C.
Configure a configuration group for European users, and set the data region to ''Europe''.
C.
Configure a configuration group for European users, and set the data region to ''Europe''.
Answers
D.
Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.
D.
Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.
Answers
Suggested answer: B

Explanation:

Assess Current OU Structure: Begin by evaluating the current organizational unit (OU) structure, which is organized by business unit.

Create Location-Based OUs: Add three additional OUs under the existing structure to categorize users based on their geographical location: United States, Europe, and Other Regions.

Assign Users to New OUs: Move users into the newly created location-based OUs according to their physical location.

Set Data Regions: Assign the appropriate data region for each new OU. For the European OU, set the data region to 'Europe' to ensure compliance with data residency requirements.

Validate Configuration: Ensure that the configuration is correctly implemented and verify that European user data is being stored in Europe.

Monitor Performance: Regularly monitor and optimize the system to ensure the fastest end-user experience globally.

Google Workspace Admin Help - Manage Data Regions

Google Workspace Admin Help - Organizational Units

As a team manager, you need to create a vacation calendar that your team members can use to share their time off. You want to use the calendar to visualize online status for team members, especially if multiple individuals are on vacation What should you do to create this calendar?

A.
Request the creation of a calendar resource, configure the calendar to ''Auto-accept invitations that do not conflict,'' and give your team ''See all event details'' access.
A.
Request the creation of a calendar resource, configure the calendar to ''Auto-accept invitations that do not conflict,'' and give your team ''See all event details'' access.
Answers
B.
Create a secondary calendar under your account, and give your team ''Make changes to events'' access.
B.
Create a secondary calendar under your account, and give your team ''Make changes to events'' access.
Answers
C.
Request the creation of a calendar resource, configure the calendar to ''Automatically add all invitations to this calendar,'' and give your team ''See only free/busy'' access.
C.
Request the creation of a calendar resource, configure the calendar to ''Automatically add all invitations to this calendar,'' and give your team ''See only free/busy'' access.
Answers
D.
Create a secondary calendar under your account, and give your team ''See only free/busy'' access
D.
Create a secondary calendar under your account, and give your team ''See only free/busy'' access
Answers
Suggested answer: B

Explanation:

Create Secondary Calendar: As the team manager, create a new calendar under your Google account specifically for tracking team vacations.

Access Settings: Go to the calendar settings and navigate to 'Share with specific people'.

Grant Access: Add your team members and give them 'Make changes to events' access, allowing them to add their vacation times directly to the calendar.

Educate Team: Inform team members on how to use this calendar to add their vacation times and check others' schedules.

Monitor Usage: Regularly review the calendar to ensure it is being used correctly and effectively by all team members.

Google Workspace Admin Help - Share a Calendar

Google Workspace Admin Help - Create a Team Calendar

Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook. How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?

A.
Allow external sharing with the auditor using the 'Trusted Domains' feature.
A.
Allow external sharing with the auditor using the 'Trusted Domains' feature.
Answers
B.
Enable the 'Visitor Sharing' feature, and demonstrate it to the Finance team.
B.
Enable the 'Visitor Sharing' feature, and demonstrate it to the Finance team.
Answers
C.
Use the 'Publish' feature in the Sheets editor to share the contents externally.
C.
Use the 'Publish' feature in the Sheets editor to share the contents externally.
Answers
D.
Attach the Sheet file to an email message, and send to the external auditor.
D.
Attach the Sheet file to an email message, and send to the external auditor.
Answers
Suggested answer: B

Explanation:

Enable Visitor Sharing: In the Google Admin console, go to Apps > Google Workspace > Drive and Docs > Sharing settings. Enable the 'Visitor Sharing' feature.

Configure Visitor Sharing: Ensure that the sharing settings allow sharing with external users who do not have a Google account.

Demonstrate to Finance Team: Conduct a training session with the Finance team to demonstrate how to use the Visitor Sharing feature securely.

Share Reports: When sharing the quarterly financial reports, use the Visitor Sharing option to generate a secure sharing link that can be accessed by the external auditor without requiring a Google account.

Monitor and Review: Regularly review shared documents to ensure that access is being appropriately managed and that the security of shared data is maintained.

Google Workspace Admin Help - Visitor Sharing

Google Workspace Admin Help - Sharing Settings

Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.

What are two ways you should accomplish this? (Choose two.)

A.
Use the Data Export Tool to export admin audit data to your existing SIEM system
A.
Use the Data Export Tool to export admin audit data to your existing SIEM system
Answers
B.
Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
B.
Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
Answers
C.
Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
C.
Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
Answers
D.
Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
D.
Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
Answers
E.
Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
E.
Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
Answers
Suggested answer: B, D

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available.

What should you do?

A.
Set up unmanaged Chromeboxes and set the executives' homepage to meet.google.com via Chrome settings.
A.
Set up unmanaged Chromeboxes and set the executives' homepage to meet.google.com via Chrome settings.
Answers
B.
Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.
B.
Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.
Answers
C.
Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives' calendars.
C.
Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives' calendars.
Answers
D.
Provision managed Chromeboxes and set the executives' Chrome homepage to meet. google.com via device policy.
D.
Provision managed Chromeboxes and set the executives' Chrome homepage to meet. google.com via device policy.
Answers
Suggested answer: B

Explanation:

Create Calendar Resources:

In the Google Workspace Admin console, navigate to 'Directory' > 'Buildings and resources' > 'Manage resources'.

Create new resources for each executive office and name them appropriately.

Deploy Hangouts Meet Hardware Kits:

Set up the Hangouts Meet Hardware Kits in each executive office.

Connect the hardware kits to the network and ensure they are configured correctly.

Associate Meet Hardware with Room Calendars:

Link each Hangouts Meet Hardware Kit to the corresponding room calendar resource.

This allows meetings scheduled in the room to automatically connect to the Meet hardware.

Set Up and Test:

Ensure that the hardware is functioning correctly by testing video conferences.

Train executives on how to use the dedicated equipment for joining Meet video conferences.

Google Workspace Admin Help: Manage buildings and resources

Google Workspace: Hangouts Meet hardware setup

Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.

What should you do?

A.
Educate users on creating personal contacts for the Partner Employees.
A.
Educate users on creating personal contacts for the Partner Employees.
Answers
B.
Add a secondary domain for the Partner Company and create user entries for each Partner user.
B.
Add a secondary domain for the Partner Company and create user entries for each Partner user.
Answers
C.
Create shared contacts in the Directory using the Directory API.
C.
Create shared contacts in the Directory using the Directory API.
Answers
D.
Create shared contacts in the Directory using the Domain Shared Contacts API.
D.
Create shared contacts in the Directory using the Domain Shared Contacts API.
Answers
Suggested answer: D

Explanation:

Enable API Access:

In the Google Workspace Admin console, go to 'Security' > 'API controls'.

Enable API access and ensure the Domain Shared Contacts API is enabled.

Use Domain Shared Contacts API:

Develop a script or application to use the Domain Shared Contacts API to create shared contacts.

Include the partner employees' contact information in the shared contacts list.

Upload Shared Contacts:

Use the script or application to upload the shared contacts to the Google Workspace Directory.

Ensure all partner contacts are correctly added and available to your employees.

Verify and Educate Users:

Verify that the shared contacts are visible to your employees in their Google Contacts.

Educate users on how to access and use the shared contacts to reduce sending errors.

Google Workspace Admin Help: Domain Shared Contacts API

Google Workspace Admin Help: Manage shared contacts

Total 197 questions
Go to page: of 20