ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 159 - Professional Google Workspace Administrator discussion

Report
Export

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching in preparation for the risk assessment you want to quickly review all the security-related settings for Gmail, Drive and Calendar and identify the ones that may be posing risk What should you do?

A.
Review all the alerts in the Alert center
Answers
A.
Review all the alerts in the Alert center
B.
Review the Security health page in the Admin console
Answers
B.
Review the Security health page in the Admin console
C.
Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps
Answers
C.
Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings tor Workspace apps
D.
Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.
Answers
D.
Review the Gmail Drive, and Calendar reports in the Reporting section in the Admin console.
Suggested answer: B

Explanation:

Access Admin Console: Log in to the Google Admin console using your administrator account.

Navigate to Security Health Page: In the Admin console, go to the Security section and select Security health. This page provides a comprehensive overview of your organization's security settings.

Review Security Settings: The Security health page lists various security settings for Gmail, Drive, and Calendar. It highlights settings that might pose a risk and provides recommendations for improvement.

Identify and Mitigate Risks: Carefully review the highlighted settings. Follow the recommendations to enhance your organization's security posture. This ensures that any potential risks are identified and mitigated promptly.

Google Workspace Admin Help: Security health

Google Workspace Security Best Practices

asked 18/09/2024
Peter Avino
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first