ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 23 - Professional Google Workspace Administrator discussion

Report
Export

Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?

A.
Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is [email protected].
Answers
A.
Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is [email protected].
B.
Have the super administrator use the Security API to audit Drive access.
Answers
B.
Have the super administrator use the Security API to audit Drive access.
C.
As a super administrator, change the access on externally shared Drive files manually under [email protected].
Answers
C.
As a super administrator, change the access on externally shared Drive files manually under [email protected].
D.
Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for [email protected].
Answers
D.
Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for [email protected].
Suggested answer: A

Explanation:

To audit if [email protected] has shared any sensitive documents outside the organization, use the Security Investigation Tool in the Google Admin console. This tool allows administrators to investigate and take action on security issues within the organization.

Open Security Investigation Tool:

Go to the Google Admin console.

Navigate to Security > Investigation tool.

Set Conditions in Drive Log Events:

In the Investigation Tool, select the data source as 'Drive Log Events'.

Add the following conditions:

Visibility Is External: This filters the events to show only documents that have been shared externally.

Actor Is [email protected]: This specifies that the actions performed by the [email protected] should be displayed.

Run the Investigation:

Click on ''Search'' to run the investigation with the specified conditions.

Review the results to identify any documents that have been shared externally by the user.

Remediate:

For any documents that were shared inappropriately, you can take corrective actions such as changing permissions or removing external sharing.

Security Investigation Tool

Audit Drive log events

asked 18/09/2024
Daniel Bucknor-Ankrah
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first