ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 56 - Professional Google Workspace Administrator discussion

Report
Export

Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.

What should you do?

A.
Enable additional security verification via email.
Answers
A.
Enable additional security verification via email.
B.
Enable authentication via the Google Authenticator.
Answers
B.
Enable authentication via the Google Authenticator.
C.
Deploy browser or device certificates via Google Workspace.
Answers
C.
Deploy browser or device certificates via Google Workspace.
D.
Configure USB Yubikeys for all users.
Answers
D.
Configure USB Yubikeys for all users.
Suggested answer: B

Explanation:

2-Step Verification (2SV):

2-Step Verification adds an extra layer of security by requiring users to verify their identity using a second factor in addition to their password. This helps protect against unauthorized access, even if the password is compromised.

Google Authenticator:

Google Authenticator is a mobile app that generates time-based one-time passcodes (TOTP) for 2SV. It works even when the device is offline, providing a secure and reliable second factor for authentication.

Implementation Steps:

Enable 2-Step Verification:

Go to the Google Admin console (admin.google.com).

Navigate to Security > Authentication > 2-Step Verification.

Turn on 2-Step Verification for the organization.

Deploy Google Authenticator:

Instruct users to download the Google Authenticator app from their respective app stores (iOS or Android).

Provide guidance on setting up Google Authenticator with their Google Workspace accounts.

Users will scan a QR code provided during the setup process to link their account with the Authenticator app.

Advantages of Google Authenticator:

Security: It provides a highly secure method of 2-step verification as the codes are generated on the user's device and change every 30 seconds.

Ease of Use: It's easy to set up and use, with a straightforward user interface.

Offline Functionality: Codes can be generated even without internet access, ensuring consistent access to 2SV codes.

Why Other Options Are Less Suitable:

A . Enable additional security verification via email:

Email-based verification is less secure than app-based 2SV because email accounts can be more easily compromised.

C . Deploy browser or device certificates via Google Workspace:

While device certificates add security, they are typically used for device management and access control rather than for 2-step verification purposes.

D . Configure USB Yubikeys for all users:

USB Yubikeys are highly secure and suitable for 2SV, but they require physical distribution and management of hardware tokens, which can be logistically complex and costly. Given the context of disabled peripheral access, this option might contradict the policy of the Chief Information Security Officer.

Google Workspace Admin Help: Set up 2-Step Verification

Google Workspace Security: 2-Step Verification

asked 18/09/2024
SoftwareONE Deutschland GmbH
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first