Your admin quarantine is becoming a burden to manage due to a consistently high influx of messages that match the content compliance rule Your security team will not allow you to remove or relax this rule, and as a result, you need assistance processing the messages in the quarantine. What is the first step you should take to enable others to help manage the quarantine, while maintaining security?
A. Give the users super admin rights to view the admin quarantine.
B. Give the users Services > Gmail > Access Admin Quarantine admin privileges.
C. Configure the admin quarantine to allow end users to release messages.
D. Give the users Services > Security Center admin privileges.
Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app.
What should you do?
A. For the Finance OU, enable the third-party app in SAML apps.
B. For the Finance OU, enable the third-party app in Marketplace Apps.
C. At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.
D. At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.
Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.
What are two ways you should accomplish this? (Choose two.)
A. Use the Data Export Tool to export admin audit data to your existing SIEM system
B. Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
C. Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
D. Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
E. Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.
What should you do?
A. Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
B. Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
C. Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
D. Create an approved senders list at the Market Research OU that contains the mass email sender addresses.
Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace. What should you do?
A. Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.
B. In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.
C. Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.
D. Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.
As a team manager, you need to create a vacation calendar that your team members can use to share their time off. You want to use the calendar to visualize online status for team members, especially if multiple individuals are on vacation What should you do to create this calendar?
A. Request the creation of a calendar resource, configure the calendar to "Auto-accept invitations that do not conflict," and give your team "See all event details" access.
B. Create a secondary calendar under your account, and give your team "Make changes to events" access.
C. Request the creation of a calendar resource, configure the calendar to "Automatically add all invitations to this calendar," and give your team "See only free/busy" access.
D. Create a secondary calendar under your account, and give your team "See only free/busy" access
The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's defense-in-depth strategy?
A. Implement an IP block on the malicious user's IPs under Security Settings in the Admin Console.
B. Use Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.
C. Enforce higher complexity passwords by rolling it out to the affected users.
D. Use Mobile device management geo-fencing to prevent malicious actors from using these stolen credentials.
The security team for your organization is concerned about phishlng attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks? Choose 2 answers
A. Configure spoofing and authentication controls to quarantine messages that are perceived as threats
B. Train end users to mark messages as spam when they see something suspicious.
C. Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.
D. Enforce confidents mode for all messages sent and received from your Workspace domain
E. Force encryption on all inbound and outbound emails from your Workspace domain.
The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing. What should you do?
A. Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
B. Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
C. Create two Drive Audit Alerts, one for each user, where the Visibility is "Shared Externally," and email them to the Director.
D. Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.
As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages--whether spam, not spam, or phishing--for a specific time period. How do you find this information?
A. Open Admin Console > Security > Dashboard > User Reports.
B. Open Admin Console > Security > Dashboard > Spam Filter-Phishing.
C. Use Reports API to query user Gmail activity.
D. Open Admin Console > Reporting > Email Log Search.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GOOGLE-WORKSPACE-ADMINISTRATOR exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.