Your organization is preparing to deploy Workspace and will continue using your company's existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user's account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete. What should your organization do?
A. Remove Google Workspace license to prevent users from accessing their accounts now.
B. Suspend users that the organization does not wish to have access.
C. Add the users to the OU with all services disabled.
D. Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.
Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?
What should you do?
A. Create a report using the OAuth Token Audit Activity logs.
B. Create a report using the Calendar Audit Activity logs.
C. Create a report using the Drive Audit Activity logs.
D. Create a reporting using the API Permissions logs for Installed Apps.
You are in charge of automating and configuring Google Cloud Directory Sync for your organization. Within the config manager, how can you proactively prevent applying widespread deletions within your Workspace environment if your company's LDAP undergoes a substantial modification?
A. Manually run Google Cloud Directory Sync only after performing a simulated sync.
B. Specify the minimum and maximum number of objects to synchronize in each configuration item.
C. Configure the tool to delete users only when run from the config manager.
D. Configure limits for the maximum number of deletions on each synchronization.
Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.
Where do you find the information your CISO is interested in seeing?
A. Security > Advanced Security Settings > Phishing Attempts
B. Apps > Google Workspace > Gmail > Phishing Attempts
C. Security > Dashboard > Spam Filter: Phishing
D. Reporting > Reports > Phishing
Your organization is in the process of deploying Google Drive for desktop so that your users can access Drive files directly from their desktops. For security reasons, you want to restrict Drive for desktop to only company-owned devices. What two steps should you take from the admin panel to restrict Drive for desktop to only company-owned devices?
Choose 2 answers
A. Create a company-owned device inventory using an asset tag.
B. Devices > Endpoints > Add a filter-> Management Type > Drive for desktop > Apply
C. Apps > Google Workspace > Drive and Docs > Features and Applications > Google Drive for Desktop > Only Allow Google Drive for desktop on authorized devices
D. Install the Google Endpoint Verification extension on machines using Drive for Desktop.
E. Create a company-owned device inventory using serial numbers of devices.
Your organization's Sales Department uses a generic user account ([email protected]) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.
What should you do?
A. Configure a Google Group as an email list.
B. Delegate email access to department employees.
C. Configure a Google Group as a collaborative inbox.
D. Configure a Google Group, and set the Access Level to Announcement Only.
A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?
A. Use Security Investigation Tool to Search Google Drive events for all of the user's documents, and use Google Admin > Reports > Email Log Search to find their emails.
B. Search Google Drive for all of the user's documents, and ask them to forward all of their emails.
C. Use the Gmail API and Google Drive API to automatically collect and export data.
D. Utilize Google Vault to hold, search, and export data of interest.
Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail. What should you do to protect your users from future unknown malware in email attachments?
A. Run queries in Security Investigation Tool.
B. Turn on advanced phishing and malware protection.
C. Enable Security Sandbox.
D. Enable Gmail confidential mode.
You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.
Which configuration should you implement?
A. Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
B. Provision accounts within your domain for the external users, and turn off external sharing for that Org.
C. Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.
D. Create a Team Drive for this engagement, and limit the memberships and sharing settings.
Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.
What should you do?
A. Educate users on creating personal contacts for the Partner Employees.
B. Add a secondary domain for the Partner Company and create user entries for each Partner user.
C. Create shared contacts in the Directory using the Directory API.
D. Create shared contacts in the Directory using the Domain Shared Contacts API.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GOOGLE-WORKSPACE-ADMINISTRATOR exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.