Professional Collaboration Engineer
Free trial
Verified
Question 1
Madeupcorp.com is in the process of migrating from a third-party email system to G Suite. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.
What should you do?
- A: Run the Transfer Tool for Unmanaged users.
- B: Use a Google Form to survey the Marketing department users.
- C: Assure the VP that there is no action required to configure G Suite.
- D: Contact Google Enterprise Support to identify affected users.
Question 2
Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say "Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE." You are responsible for making sure that users cannot remove the footer.
What should you do?
- A: Send an email to each sales person with the instructions on how to add the footer to their Signature.
- B: Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.
- C: Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.
- D: Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.
Question 3
What action should be taken to configure alerting related to phishing attacks?
- A: Set up a Token audit log event alert.
- B: Set up an Admin audit log event alert.
- C: Set up an email settings changed alert.
- D: Set up a suspicious login event alert.
Question 4
A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
- A: Turn on password expiration.
- B: Enforce 2FA with a physical security key.
- C: Use a third-party identity provider.
- D: Enforce 2FA with Google Authenticator app.
Question 5
After migrating to G Suite, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.
What should you do?
- A: Add the legal team to the User Management Admin system role.
- B: Add the legal team to the Google Vault Google Group.
- C: Create a custom role with Google Vault access, and add the legal team.
- D: Create a matter in Google Vault, and share with the legal team.
Question 6
Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.
Which combination of attributes will meet this objective?
- A: Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
- B: Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
- C: Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
- D: Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
Question 7
Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.
What two features are essential to reconfigure in G Suite? (Choose two.)
- A: Apps > add SAML apps to your domain.
- B: Reconfigure user provisioning via Google Cloud Directory Sync.
- C: Replace the third-party IDP verification certificate.
- D: Disable SSO with third party IDP.
- E: Enable API Permissions for Google Cloud Platform.
Question 8
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)
- A: Mac OS
- B: Windows
- C: Chrome OS
- D: iOS
- E: Linux
Question 9
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.
What should you do?
- A: Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
- B: Change Enrollment Controls to Place Chrome device in user organization.
- C: Change Enrollment Controls to Keep Chrome device in current location.
- D: Change Enrolment Permissions to not allow users in this organization to enroll new devices.
Question 10
A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges.
You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs.
What two actions should be taken on this call with the user? (Choose two.)
- A: Ask the user to send an email to you so you can check the headers.
- B: Record a HAR file of the user composing a new email.
- C: Take screenshots of the user's screen when composing an email.
- D: Use the Email log search in the Admin panel.
- E: Check the Users > App Users Activity report.
Question 11
Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app.
What should you do?
- A: For the Finance OU, enable the third-party app in SAML apps.
- B: For the Finance OU, enable the third-party app in Marketplace Apps.
- C: At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the G Suite Marketplace.
- D: At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the G Suite Marketplace.
Question 12
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant
Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.
What should you do?
- A: Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
- B: Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
- C: Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
- D: Create an approved senders list at the Market Research OU that contains the mass email sender addresses.
Question 13
The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue.
What two actions should you take? (Choose two.)
- A: Obtain the message header and analyze using G Suite Toolbox.
- B: Review the contents of the messages in Google Vault.
- C: Set up a Gmail routing rule to whitelist the sender.
- D: Conduct an Email log search to trace the message route.
- E: Validate that your domain is not on the Spamhaus blacklist.
Question 14
Security and Compliance has identified that data is being leaked through a third-party application connected to G SuiteÑŽ You want to investigate using an audit log.
What log should you use?
- A: Admin audit log
- B: SAML audit log
- C: Drive usage audit log
- D: OAuth Token audit log
Question 15
Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using G Suite.
What should you do?
- A: Enable additional security verification via email.
- B: Enable authentication via the Google Authenticator.
- C: Deploy browser or device certificates via G Suite.
- D: Configure USB Yubikeys for all users.
Question 16
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:
✑ Control password policies.
✑ Make corporate apps available to the users.
✑ Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
- A: Turn on Advanced Mobile Management for the domain.
- B: Turn on Advanced Mobile Management for Sales OU
- C: Set up Device Approvals.
- D: Set up an Apple Push Certificate.
- E: Deploy Apple Certificate to every device.
That’s the end of your free questions
You’ve reached the preview limit for Professional Collaboration EngineerConsider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!