The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?
A. Configure a safety rule to protect against encrypted attachments from untrusted senders
B. Configure a safety rule to protect against attachments with scripts from untrusted senders.
C. In the security sandbox section, enable virtual execution of attachments for (he targeted OU
D. In the security sandbox section, enable virtual execution of attachments for the entire organization.
Your organization does not allow users to share externally. The security team has recently approved an exemption for specific members of the marketing team and sales to share documents with external customers, prospects, and partners. How best would you achieve this?
A. Create a configuration group with the approved users as members, and use it to create a target audience.
B. Enable external sharing for the marketing and sales organizational units.
C. Enable external sharing only to allowlisted domains provided by marketing and sales teams.
D. Create a configuration group with the approved users as members, and enable external sharing for this group.
The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.
What two actions should you take? (Choose two.)
A. Configure objectionable content to reject messages with the words "wire transfer."
B. Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
C. Create a rule requiring secure transport for all messages regarding wire transfers.
D. Add the sender of the wire transfer email to the blocked senders list.
E. Enable all admin settings in Gmail's safety > spoofing and authentication.
A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam. What steps should the admin take to prevent this behavior in the future?
A. Modify the SPF record for your internal domain to include the IPs of the external user's mail servers.
B. Update the spam settings in the Admin Console to be less aggressive.
C. Add the sender's domain to an allowlist via approved senders in the Admin Console.
D. Instruct the user to add the senders to their contacts.
You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?
A. Set up the shared drive, and add the users as Content Managers of the drive.
B. Set up the shared drive, and add the users as editors of the drive.
C. Set up the shared drive, and add the users as Contributors of the drive.
D. Set up the shared drive, and add the users as Managers of the drive.
Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory. How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)
A. Provide your current GCDS instance with admin credentials to the recently acquired organization's LDAP directory.
B. Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.
C. Set up exclusion rules to ensure that users synced from the acquired organization's LDAP are not, suspended.
D. Set up an additional instance of GCDS running on another server, and handle the acquired organization's synchronization.
E. Upgrade to the multiple LDAP version of GCDS.
The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from
last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.
What should you do?
A. Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.
B. Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.
C. Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.
Your Security Officer ran the Security Health Check and found the alert that "Installation of mobile applications from unknown sources" was occurring. They have asked you to find a way to prevent that from happening.
Using Mobile Device Management (MDM), you need to configure a policy that will not allow mobile applications to be installed from unknown sources.
What MDM configuration is needed to meet this requirement?
A. In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.
B. In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.
C. In Android Settings, ensure that "Allow non-Play Store apps from unknown sources installation" is unchecked.
D. In Device Management > Setup > Device Approvals menu, configure the "Requires Admin approval" option.
Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.
What should you do?
A. Enable additional security verification via email.
B. Enable authentication via the Google Authenticator.
C. Deploy browser or device certificates via Google Workspace.
D. Configure USB Yubikeys for all users.
Your organization has just completed migrating users to Workspace. Many employees are concerned about their legacy Microsoft Office documents, including issues of access, editing, and viewing. Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features? (Choose two.)
A. Configure Context-Aware Access policies to block access to Microsoft Office applications.
B. Demonstrate the ability to convert Office documents to native Google file format from Drive.
C. Demonstrate and train users to use the Workspace Migrate tool.
D. Deliver training sessions that show the methods to access and edit native Office files in Drive, the Workspace file editors, and Drive for Desktop.
E. Continue to use installed Office applications along with Google Drive for Desktop.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GOOGLE-WORKSPACE-ADMINISTRATOR exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.