ExamGecko
Home Home / Google / Professional Google Workspace Administrator

Google Professional Google Workspace Administrator Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail's address autocomplete for all users in the domain.

What are two options to meet this requirement? (Choose two.)

A.
Use the Directory API to upload a .csv file containing the contacts.
A.
Use the Directory API to upload a .csv file containing the contacts.
Answers
B.
Configure GCDS to populate a Group with external members.
B.
Configure GCDS to populate a Group with external members.
Answers
C.
Use the People API to upload a .csv file containing the contacts.
C.
Use the People API to upload a .csv file containing the contacts.
Answers
D.
Develop a custom application to call the Domain Shared Contacts API.
D.
Develop a custom application to call the Domain Shared Contacts API.
Answers
E.
Configure GCDS to synchronize shared contacts.
E.
Configure GCDS to synchronize shared contacts.
Answers
Suggested answer: D, E

Explanation:

Develop Custom Application:

Use the Domain Shared Contacts API to create a custom application.

The application should read the contacts from your corporate LDAP and upload them to Google Workspace.

This will ensure that these contacts appear in the address autocomplete for all users.

Configure Google Cloud Directory Sync (GCDS):

Install and configure GCDS on a supported server.

Set up synchronization to include shared contacts from your LDAP directory.

This will automatically keep the contacts updated and available in Gmail's address autocomplete.

Google Workspace Admin: Google Cloud Directory Sync

Google Workspace Admin: Domain Shared Contacts API

You are supporting an investigation that is being conducted by your litigation team. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user's awareness.

What two actions should you take? (Choose two.)

A.
Move the user to their own Organization Unit, and set a custom retention policy
A.
Move the user to their own Organization Unit, and set a custom retention policy
Answers
B.
Create a matter using Google Vault, and share the matter with the litigation team members.
B.
Create a matter using Google Vault, and share the matter with the litigation team members.
Answers
C.
Create a hold on the user's mailbox in Google Vault
C.
Create a hold on the user's mailbox in Google Vault
Answers
D.
Reset the user's password, and share the new password with the litigation team.
D.
Reset the user's password, and share the new password with the litigation team.
Answers
E.
Copy the user's data to a secondary account.
E.
Copy the user's data to a secondary account.
Answers
Suggested answer: B, C

Explanation:

Create a Matter in Google Vault:

Log into Google Vault.

Click on 'Matters' and then 'Create'.

Name the matter appropriately (e.g., User Investigation).

Share the matter with the litigation team members by adding their email addresses under the 'Sharing' settings.

Create a Hold on the User's Mailbox:

In the created matter, go to the 'Holds' tab.

Click on 'Create Hold'.

Specify the user's email address to place their mailbox under hold.

Set the parameters for the hold to ensure all relevant data is preserved and cannot be tampered with.

Google Workspace Admin: Create and manage matters in Google Vault

Google Workspace Admin: Create and manage holds in Google Vault

Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit.

What should you do?

A.
From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.
A.
From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.
Answers
B.
From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.
B.
From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.
Answers
C.
From the Google Workspace Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.
C.
From the Google Workspace Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.
Answers
D.
From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.
D.
From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.
Answers
Suggested answer: C

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com.

Reports Menu: Navigate to Reports > Reports.

Accounts Aggregate Report:

Under the ''Reports'' section, select ''Accounts''.

Click on ''Aggregate'' to view the report.

Download Data:

Click on the download icon and choose ''Google Sheets'' as the format to export the data.

This report includes a count of active and suspended users by organizational unit.

Google Sheets:

Open the downloaded report in Google Sheets.

Review and organize the data as needed to present it by Org unit, ensuring it matches the Regions and Departments within your company.

Google Workspace Admin: Reports overview

Google Workspace Admin: Aggregate reports

You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.

Which configuration should you implement?

A.
Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
A.
Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
Answers
B.
Provision accounts within your domain for the external users, and turn off external sharing for that Org.
B.
Provision accounts within your domain for the external users, and turn off external sharing for that Org.
Answers
C.
Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.
C.
Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.
Answers
D.
Create a Team Drive for this engagement, and limit the memberships and sharing settings.
D.
Create a Team Drive for this engagement, and limit the memberships and sharing settings.
Answers
Suggested answer: D

Explanation:

https://support.google.com/a/users/answer/9310352#1.1

Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

A.
Use the login audit report to export all suspicious login details for analysis.
A.
Use the login audit report to export all suspicious login details for analysis.
Answers
B.
Create a custom dashboard with the security investigation tool showing suspicious logins.
B.
Create a custom dashboard with the security investigation tool showing suspicious logins.
Answers
C.
Use the account activity report to export all suspicious login details for analysis.
C.
Use the account activity report to export all suspicious login details for analysis.
Answers
D.
Create a custom query in BigQuery showing all suspicious login details.
D.
Create a custom query in BigQuery showing all suspicious login details.
Answers
Suggested answer: A

Explanation:

Access the Admin Console:

In the Google Workspace Admin console, navigate to 'Reports' > 'Audit' > 'Login'.

Generate a Login Audit Report:

Customize the report to include details about suspicious login attempts.

Set the time frame to the past year and filter the results to show only suspicious logins.

Export the Report:

Export the login audit report in a suitable format (e.g., CSV) for further analysis.

Ensure the report includes user account details and the number of suspicious login attempts for each account.

Analyze the Data:

Review the exported data to identify patterns and determine how frequently suspicious login attempts occur within the organization.

Provide the analysis to the CISO with the required details for each user account.

Google Workspace Admin Help: View and analyze login audit logs

In the years prior to your organization moving to Google Workspace, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on Google Workspace.) You were able to address active employees' use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account.

What should you do?

A.
Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-Google Workspace Google services and have them blocked.
A.
Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-Google Workspace Google services and have them blocked.
Answers
B.
Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
B.
Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
Answers
C.
Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
C.
Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
Answers
D.
Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all Google Workspace and Other Google Services disabled.
D.
Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all Google Workspace and Other Google Services disabled.
Answers
Suggested answer: B

Explanation:

Access the Transfer Tool:

In the Google Workspace Admin console, go to 'Users' > 'Transfer tool for unmanaged users'.

Identify Unmanaged Accounts:

Use the tool to search for unmanaged accounts (consumer Google accounts) that have corporate email addresses.

Send Transfer Requests:

Send transfer requests to the identified unmanaged accounts, asking the former users to transfer their accounts to your managed domain.

Monitor and Complete Transfers:

Monitor the transfer process and ensure that the accounts are successfully transferred.

Verify that the transferred accounts are now managed under your Google Workspace domain, preventing unauthorized access to services.

Google Workspace Admin Help: Transfer tool for unmanaged users

Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information.

What should you do?

A.
Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
A.
Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Answers
B.
Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
B.
Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Answers
C.
Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
C.
Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Answers
D.
Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
D.
Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Answers
Suggested answer: B

Explanation:

https://support.google.com/a/answer/2463723?hl=en

The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management.

What should you do?

A.
Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
A.
Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
Answers
B.
Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of Google Workspace.
B.
Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of Google Workspace.
Answers
C.
Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
C.
Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
Answers
D.
Change Google Workspace release track to: Rapid Release for faster access to new features.
D.
Change Google Workspace release track to: Rapid Release for faster access to new features.
Answers
Suggested answer: C

Explanation:

Subscribe to the Google Workspace Release Calendar:

Go to the Google Workspace Updates blog at https://workspaceupdates.googleblog.com/.

Click on 'Subscribe to updates' to get real-time notifications about new features, updates, and changes in Google Workspace.

This will ensure you and your team are informed about the latest security and collaboration features as they are announced.

Join the Google Cloud Connect Community:

Visit the Google Cloud Connect Community at https://cloudconnectcommunity.google/.

Join the community to engage with other Google Workspace administrators and users.

Participate in discussions, ask questions, and stay informed about best practices, upcoming features, and insights directly from Google Workspace experts and peers.

Google Workspace Updates Blog

Google Cloud Connect Community

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your- company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.

What steps should you take?

A.
Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.
A.
Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.
Answers
B.
Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.
B.
Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.
Answers
C.
Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.
C.
Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.
Answers
D.
Set up a Default route with split delivery to route email to the on-premises server.
D.
Set up a Default route with split delivery to route email to the on-premises server.
Answers
Suggested answer: D

Explanation:

Access the Admin Console:

Log in to the Google Workspace Admin console at https://admin.google.com/.

Configure Email Routing:

Navigate to 'Apps' > 'Google Workspace' > 'Gmail' > 'Default routing'.

Set Up Split Delivery:

Create a new default routing rule.

Under 'Add setting,' click on 'Routing.'

In the 'Add setting' box, under 'Inbound,' select 'Configure' next to 'Routing.'

Under 'Add setting,' name your routing policy.

In the 'Email messages to affect' section, specify the conditions for the rule (e.g., recipients in the new-company.com domain).

Route to On-Premises Server:

In the 'Route' section, select 'Modify message' > 'Add more recipients.'

Enter the on-premises email server information (e.g., SMTP relay server) to forward emails to the on-premises server.

Save the rule and ensure it is active.

Test the Configuration:

Send test emails to ensure that emails are correctly routed to the on-premises server as per the split delivery setup.

Monitor the email flow and make adjustments if necessary to ensure smooth operation during the peak season.

Google Workspace Admin Help: Set up routing for your domain or organization

Google Workspace Admin Help: Configure routing for mail in Google Workspace

A user does not follow their usual sign-in pattern and signs in from an unusual location.

What type of alert is triggered by this event?

A.
Suspicious mobile activity alert.
A.
Suspicious mobile activity alert.
Answers
B.
Suspicious login activity alert.
B.
Suspicious login activity alert.
Answers
C.
Leaked password alert.
C.
Leaked password alert.
Answers
D.
User sign-in alert.
D.
User sign-in alert.
Answers
Suggested answer: B

Explanation:

Identify Suspicious Login Activity:

Google Workspace triggers a suspicious login activity alert when a user signs in from an unusual location or device that is not part of their regular sign-in pattern.

Review Alerts:

Go to the Google Workspace Admin console.

Navigate to 'Security' > 'Dashboard' > 'Suspicious login activity'.

Review the details of the alert to determine the nature of the suspicious login.

Take Appropriate Actions:

Investigate the alert to ensure that the login attempt is legitimate.

If the login is deemed suspicious, follow security protocols to secure the user account, such as resetting the password or enabling two-factor authentication.

Google Workspace Admin Help: Review security alerts

Total 197 questions
Go to page: of 20