Pass the Google Workspace Administrator Google-Workspace-Administrator Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your company has a globally distributed remote work team. You want to ensure all team members adhere to the company's data security policies and only access authorized systems based on their location and role. What should you do?

Options:

A.

Create and enforce data loss prevention (DLP) rules to control data sharing.


B.

Set up and mandate the use of a company-wide VPN for all remote access.


C.

Implement two-factor authentication for all remote team members.


D.

Configure access control policies with conditional access.


Expert Solution
Questions # 12:

Your organization has detected a significant rise in unauthorized access to applications from personal devices. This poses a critical security risk and could lead to data loss. To mitigate this risk, you must immediately restrict user access to these applications. What should you do?

Options:

A.

Limit apps access to company-issued devices by using context-aware access.


B.

Enable multi-factor authentication for application access.


C.

Enable data loss prevention rules.


D.

Configure apps data access to Limited to only allow access to unrestricted services.


Expert Solution
Questions # 13:

Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?

Options:

A.

Create a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.


B.

Create a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.


C.

Create a Google Group and update the settings to allow anyone in the organization to join the group.


D.

Create a Google Group and appoint a group admin to manage the membership of this group.


Expert Solution
Questions # 14:

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

Options:

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.


B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.


C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.


D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.


Expert Solution
Questions # 15:

Your company has recently migrated from an on-premises email solution to Google Workspace. You have successfully added and verified the new primary domain. However, you also want to continue receiving emails sent to your former on-premises email server for a transitional period. You need to ensure that emails sent to your former domain are still delivered to your on-premises server, even though your primary email system is now Google Workspace. What should you do?

Options:

A.

Configure MX records for the former domain to point to your on-premises email servers.


B.

Add the former domain as a secondary domain in your Google Workspace settings and verify the domain.


C.

Adjust the TTL (Time-to-Live) for the former domain to ensure a smooth transition.


D.

Add the former domain as a domain alias for the primary domain.


Expert Solution
Questions # 16:

Your organization wants to prevent a group of users from logging into their Google Drive when they are traveling internationally for business.

You have added these users to an organizational unit (OU). You need to secure the users’ access to the Google Drive app to meet this requirement.

What should you do?

Options:

A.

Disable Google Drive for users in the OU.


B.

Define location-based access levels. Assign the levels to the Google Drive app for the OU.


C.

Require 2-step verification (2SV) when users in the OU sign in.


D.

Define user-based access levels. Assign the levels to the Google Drive app for the OU.


Expert Solution
Questions # 17:

Your organization is concerned about unauthorized access attempts. You want to implement a security measure that makes users change their password if there are twenty or more failed login attempts within one hour. You want to use the most effective and efficient approach. What should you do?

Options:

A.

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.


B.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.


C.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.


D.

Enable email alerts to notify users that they need to change their password.


Expert Solution
Questions # 18:

Your organization handles a significant amount of sensitive customer data and must follow strict industry regulations. To meet an upcoming compliance deadline, you need to quickly implement a solution that automatically classifies files stored in Google Drive based on the content of files.

What should you do?

Options:

A.

Create data loss prevention (DLP) rules for Drive. Configure the rules to apply Drive labels based on content.


B.

Apply Drive labels based on content. Use Google Vault to create retention rules based on Drive labels, ensuring that data is kept for the required duration.


C.

Implement a third-party data governance tool that integrates with Drive and provides advanced classification capabilities.


D.

Add users into organizational units (OUs). Configure default file classification in Drive for the desired OUs.


Expert Solution
Questions # 19:

Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?

Options:

A.

End all unsupervised meetings by using the Google Meet APIs.


B.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.


C.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.


D.

Identify and end all unsupervised meetings by using the security investigation tool.


Expert Solution
Questions # 20:

External sharing at your company is only permitted for the sales and marketing department. Engineering is not allowed to share externally. You need to configure the sharing settings to comply with this policy. What should you do?

Options:

A.

Use a data loss prevention (DLP) solution to control external sharing based on user groups.


B.

Create separate shared drives for each department with different external sharing settings.


C.

Create organizational units (OUs) for each department. Configure different external sharing settings for each OU.


D.

Configure Drive trust rules to restrict the engineering department from sharing externally.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions