ExamGecko
Home Home / Google / Professional Google Workspace Administrator

Google Professional Google Workspace Administrator Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to Google Workspace data, the data they have access to, and the number of users who are using the applications.

How should you compile the data being requested?

A.
Review the authorized applications for each user via the Google Workspace Admin panel.
A.
Review the authorized applications for each user via the Google Workspace Admin panel.
Answers
B.
Create a survey via Google forms, and collect the application data from users.
B.
Create a survey via Google forms, and collect the application data from users.
Answers
C.
Review the token audit log, and compile a list of all the applications and their scopes.
C.
Review the token audit log, and compile a list of all the applications and their scopes.
Answers
D.
Review the API permissions installed apps list, and export the list.
D.
Review the API permissions installed apps list, and export the list.
Answers
Suggested answer: C

Explanation:

Access Admin Console: Log into your Google Workspace Admin Console.

Navigate to Reports: Go to the Reports section in the Admin Console.

Token Audit Log: Within the Reports, access the 'Token Audit' log. This log provides details on OAuth tokens issued to applications by your users.

Review Applications: Review the list of applications that have been granted access to your Google Workspace data. This will include information about the scopes (types of data) that each application can access.

Compile List: Compile a list of all the applications from the token audit log. Include details about the data they have access to and the number of users using each application.

Export Data: You can export this data to a spreadsheet for further analysis and reporting to your chief compliance officer.

Google Support: Token audit log

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data.

What two actions should you take? (Choose two.)

A.
Add the user's old email address to their account in the Google Workspace Admin panel.
A.
Add the user's old email address to their account in the Google Workspace Admin panel.
Answers
B.
Change the user's primary email address in the Google Workspace Admin panel.
B.
Change the user's primary email address in the Google Workspace Admin panel.
Answers
C.
Change the user's last name in the Google Workspace Admin panel.
C.
Change the user's last name in the Google Workspace Admin panel.
Answers
D.
Change the user's primary email in Active Directory.
D.
Change the user's primary email in Active Directory.
Answers
E.
Change the user's last name in Active Directory.
E.
Change the user's last name in Active Directory.
Answers
Suggested answer: D, E

Explanation:

Update Active Directory: Since your organization syncs directory data from Active Directory to Google Workspace, any changes to user data need to be made in Active Directory first.

Change Primary Email in AD: Change the user's primary email address in Active Directory. This will ensure that the new email address is synchronized with Google Workspace.

Change Last Name in AD: Similarly, change the user's last name in Active Directory. This ensures the updated name is synchronized correctly.

Sync Changes: Wait for the next synchronization cycle of Google Cloud Directory Sync (GCDS) to update the changes in Google Workspace.

Verify Changes in Google Workspace: After the sync is complete, verify that the changes to the user's email address and last name have been successfully updated in Google Workspace.

Google Support: Google Cloud Directory Sync

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?

What should you do?

A.
Create a report using the OAuth Token Audit Activity logs.
A.
Create a report using the OAuth Token Audit Activity logs.
Answers
B.
Create a report using the Calendar Audit Activity logs.
B.
Create a report using the Calendar Audit Activity logs.
Answers
C.
Create a report using the Drive Audit Activity logs.
C.
Create a report using the Drive Audit Activity logs.
Answers
D.
Create a reporting using the API Permissions logs for Installed Apps.
D.
Create a reporting using the API Permissions logs for Installed Apps.
Answers
Suggested answer: A

Explanation:

Access Admin Console: Log into your Google Workspace Admin Console.

Navigate to Reports: Go to the Reports section within the Admin Console.

OAuth Token Audit Log: Access the OAuth Token Audit Activity logs. This log provides detailed information about third-party applications that have been granted access to your Google Workspace data.

Review Data Access: Review the logs to see which applications have accessed what type of data. This includes details on the scopes of access requested by the applications.

Generate Report: Create a report from these logs to provide granular insight into the data accessed by third-party applications. This report can be used to assess and mitigate any potential risks.

Google Support: Token audit log

The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing.

What should you do?

A.
Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
A.
Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
Answers
B.
Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
B.
Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
Answers
C.
Create two Drive Audit Alerts, one for each user, where the Visibility is ''Shared Externally,'' and email them to the Director.
C.
Create two Drive Audit Alerts, one for each user, where the Visibility is ''Shared Externally,'' and email them to the Director.
Answers
D.
Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.
D.
Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.
Answers
Suggested answer: C

Explanation:

Access Admin Console: Log into your Google Workspace Admin Console.

Navigate to Alert Center: Go to the Alert Center within the Admin Console.

Create Drive Audit Alerts: Create two separate Drive audit alerts for each of the financial auditors.

Set Visibility Condition: Configure the alert condition to trigger when the visibility of any file shared by these users is set to ''Shared Externally''.

Set Notification: Configure the alert to send an email notification to the Director of the Finance department whenever the condition is met.

Save Alerts: Save the alerts and ensure they are active.

Google Support: Alert Center

Google Support: Drive audit logs

Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing ''Secret Project 123.''

What steps should you take to satisfy this request?

A.
Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to ''secret project 123.'' Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, [email protected]. Save.
A.
Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to ''secret project 123.'' Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, [email protected]. Save.
Answers
B.
Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: [email protected], user2@your-company. Set the search terms to: (secret project 123). Save.
B.
Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: [email protected], user2@your-company. Set the search terms to: (secret project 123). Save.
Answers
C.
Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your- company.com AND [email protected]. Set the search terms to: secret AND project AND 123. Save.
C.
Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your- company.com AND [email protected]. Set the search terms to: secret AND project AND 123. Save.
Answers
D.
Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: [email protected], user2@your-company. Set the search terms to secret OR project OR 123. Save.
D.
Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: [email protected], user2@your-company. Set the search terms to secret OR project OR 123. Save.
Answers
Suggested answer: B

Explanation:

Create a Matter: Access Google Vault and create a new matter for the lawsuit. Matters are used to manage legal holds and searches.

Create a Hold: Within the matter, create a new hold.

Set the Hold Scope: Set the hold scope to Gmail, since the requirement is to discover and hold emails.

Specify Accounts: Set the usernames to [email protected] and [email protected]. This ensures that all emails for these specific users are held.

Set Search Terms: Use the search terms ''secret project 123'' to hold any emails that reference this specific term. This is a broad search that captures any email mentioning 'Secret Project 123.'

Save the Hold: Save the hold to ensure that it captures all relevant emails for the specified users and the search term.

Google Support: Create or update a hold

Your Security Officer ran the Security Health Check and found the alert that ''Installation of mobile applications from unknown sources'' was occurring. They have asked you to find a way to prevent that from happening.

Using Mobile Device Management (MDM), you need to configure a policy that will not allow mobile applications to be installed from unknown sources.

What MDM configuration is needed to meet this requirement?

A.
In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.
A.
In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.
Answers
B.
In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.
B.
In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.
Answers
C.
In Android Settings, ensure that ''Allow non-Play Store apps from unknown sources installation'' is unchecked.
C.
In Android Settings, ensure that ''Allow non-Play Store apps from unknown sources installation'' is unchecked.
Answers
D.
In Device Management > Setup > Device Approvals menu, configure the ''Requires Admin approval'' option.
D.
In Device Management > Setup > Device Approvals menu, configure the ''Requires Admin approval'' option.
Answers
Suggested answer: C

Explanation:

Access the Admin Console: Log into your Google Workspace Admin Console.

Navigate to Device Management: Go to the Device Management section.

Android Settings: Within Device Management, access the Android settings.

Configure Application Settings: Ensure that the setting ''Allow non-Play Store apps from unknown sources installation'' is unchecked. This will prevent users from installing apps from unknown sources, thereby enhancing security.

Save Configuration: Save the configuration changes to apply the policy across all managed Android devices.

After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff.

What should you do?

A.
Create a custom Apps Script to reset passwords.
A.
Create a custom Apps Script to reset passwords.
Answers
B.
Use a third-party tool for password recovery.
B.
Use a third-party tool for password recovery.
Answers
C.
Enable non-admin password recovery.
C.
Enable non-admin password recovery.
Answers
D.
Create a Google form to submit reset requests.
D.
Create a Google form to submit reset requests.
Answers
Suggested answer: C

Explanation:

Access the Admin Console: Log into your Google Workspace Admin Console.

Navigate to Security Settings: Go to the Security section in the Admin Console.

Password Recovery: Enable the option for non-admin password recovery. This feature allows users to reset their own passwords using their recovery email address or phone number without needing to contact the helpdesk.

Configure Recovery Options: Ensure users have their recovery options set up (recovery email and phone number) so they can use this feature effectively.

Inform Users: Notify users about this new self-service password recovery option and provide instructions on how to use it.

Google Support: Set up self-service password recovery

Your organization deployed Google Workspace Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your Google Workspace organization.

What should you do?

A.
Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
A.
Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
Answers
B.
Use Work Insights to gather adoption metrics and target your training exercises.
B.
Use Work Insights to gather adoption metrics and target your training exercises.
Answers
C.
Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
C.
Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
Answers
D.
Use a script to monitor Email attachment types and target users that aren't using Drive sharing.
D.
Use a script to monitor Email attachment types and target users that aren't using Drive sharing.
Answers
Suggested answer: B

Explanation:

Access Work Insights: Log into your Google Workspace Admin Console and access Work Insights.

Gather Adoption Metrics: Use Work Insights to gather data on how users are adopting Google Workspace. This includes information on how often they are using different Google Workspace applications and features.

Analyze Data: Analyze the data to identify which teams or departments may need additional training and support.

Targeted Training: Develop targeted training exercises based on the insights gathered. Focus on areas where adoption is low or where users are not taking full advantage of the available features.

Implement Training: Use Google Guides or other training methods to deliver the targeted training sessions.

Monitor Progress: Continue to use Work Insights to monitor adoption and adjust the training plan as necessary.

Google Support: Work Insights

Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, [email protected] to the cloud platform's email address, [email protected]. As a security measure, you have mail forwarding disabled at the domain level.

What should you do?

A.
Create a mail contact in the Google Workspace directory that has an email address of your- [email protected]
A.
Create a mail contact in the Google Workspace directory that has an email address of your- [email protected]
Answers
B.
Create a rule to forward mail in the [email protected] mailbox to your- [email protected]
B.
Create a rule to forward mail in the [email protected] mailbox to your- [email protected]
Answers
C.
Create a recipient map in the Google Workspace Admin console that maps [email protected] to [email protected]
C.
Create a recipient map in the Google Workspace Admin console that maps [email protected] to [email protected]
Answers
D.
Create a content compliance rule in the Google Workspace Admin console to change route to your- [email protected]
D.
Create a content compliance rule in the Google Workspace Admin console to change route to your- [email protected]
Answers
Suggested answer: D

Explanation:

Access the Admin Console: Log into your Google Workspace Admin Console.

Navigate to Apps: Go to Apps > Google Workspace > Gmail > Compliance.

Create a Content Compliance Rule: Create a new content compliance rule.

Set Conditions: Set the condition to apply to incoming mail for [email protected].

Change Route: Configure the rule to change the route to [email protected]. This effectively reroutes emails without using traditional forwarding, which is disabled at the domain level.

Save and Apply: Save the compliance rule and ensure it is applied to enforce the new routing policy.

Google Support: Set up content compliance

Your business partner requests that a new custom cloud application be set up to log in without having separate credentials.

What is your business partner required to provide in order to proceed?

A.
Service provider logout URL
A.
Service provider logout URL
Answers
B.
Service provider ACS URL
B.
Service provider ACS URL
Answers
C.
Identity Provider URL
C.
Identity Provider URL
Answers
D.
Service provider certificate
D.
Service provider certificate
Answers
Suggested answer: B

Explanation:

In order to set up a new custom cloud application to log in without having separate credentials, you need to configure Single Sign-On (SSO) using SAML (Security Assertion Markup Language). The Assertion Consumer Service (ACS) URL is a critical piece of information required for this configuration. It is the endpoint on the service provider's system that receives the authentication assertions from the identity provider (Google Workspace in this case).

Service Provider ACS URL: The ACS URL is necessary for the SSO configuration because it is the URL to which the identity provider will send the SAML assertion after authentication. This URL tells the identity provider where to send the SAML response after the user has been authenticated.

Configuration Steps:

In Google Admin console, navigate to Apps > Web and mobile apps.

Add a custom SAML app.

Enter the ACS URL provided by the service provider in the appropriate field.

Complete the configuration by providing other necessary information such as the Entity ID and Name ID format.

Importance: Without the ACS URL, the identity provider will not know where to send the authentication tokens, making SSO impossible.

Google Workspace Admin Help: Set up your own custom SAML app

Total 197 questions
Go to page: of 20