You are configuring email for your company’s Google Workspace account. The company wants to prevent certain types of files from being sent or received as email attachments in the simplest and most cost-effective way. What should you do?
AAdjust the maximum message size limit to prevent large files from being sent or received.
BEnable the Security Sandbox in Gmail to automatically quarantine emails with suspicious attachments.
CScan all incoming and outgoing emails for malicious attachments by using an industry standard third-party email security solution.
DConfigure an attachment compliance rule in Gmail settings to block specific file types.
Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?
ARun the Transfer tool to bring unmanaged users to your Workspace account.
BCheck domain ownership in the DNS settings.
CWait 24 hours after signing up for the features to become active.
DUpgrade to a Google Workspace Enterprise edition.
Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?
ASearch the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.
BSearch for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.
CCollect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.
DSearch for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.
Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?
AConfigure the Drive sharing options for the domain to internal only.
BRestrict the Drive sharing options for the domain to allowlisted domains.
CCreate a Drive DLP rule, and use the sensitive internal Project name as the detector.
DTurn off the Drive sharing setting from the Team dashboard.
Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?
AImplement a third-party enterprise mobility management (EMM) provider.
BSet up advanced mobile management for iOS devices and basic mobile management for Android devices.
CSet up basic management for both iOS and Android devices.
DSet up advanced management for both iOS and Android devices.
Question 6
Monitoring and troubleshooting common issues
0
Question 7
Managing security policies and access controls
Question 8
Managing security policies and access controls
Question 9
Managing security policies and access controls
Question 10
Managing data governance and compliance
Question 11
Managing browsers and endpoints
Question 12
Monitoring and troubleshooting common issues
Question 13
Managing user accounts, domains, and Directory
Question 14
Managing user accounts, domains, and Directory
Question 15
Managing data governance and compliance
Question 16
Managing user accounts, domains, and Directory
Question 17
Managing data governance and compliance
Question 18
Managing data governance and compliance
Question 19
Managing security policies and access controls
Question 20
Managing security policies and access controls
Question 21
Managing core Workspace services
Question 22
Managing security policies and access controls
Question 23
Managing data governance and compliance
Question 24
Monitoring and troubleshooting common issues
Question 25
Monitoring and troubleshooting common issues
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?
AEnd all unsupervised meetings by using the Google Meet APIs.
BEnable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.
CTurn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.
DIdentify and end all unsupervised meetings by using the security investigation tool.
Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?
AAdd the Trusted Workspace domain names in the Stream dialog box.
BTurn off live streaming to Youtube.
CAdd participants to an organizational unit (OU). Turn on live streaming.
DTurn on in-house live streaming. Invite users from affiliated domains.
You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?
ATurn Google Sites access on for each of the 15 users in the task force.
BCreate a configuration group for the task force’s 15 users. Grant Google Sites access to the group.
CPlace the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.
DCreate an access group for the task force’s 15 users. Grant Google Sites access to the group.
Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external Google Groups with their Google Workspace accounts without interrupting internal group usage. What should you do?
ASet the setting for Google Groups for Business called Accessing groups from outside this organization to Private.
BIn Additional Google Services, turn Google Groups OFF at the root organizational unit.
CUse the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.
DSet the setting for Google Groups for Business called Default for permission to view conversations to All organization users.
You need to ensure that data owned by former employees remains available in Google Vault. You want to use the most cost-effective solution.
What should you do?
AMigrate the former employees’ Gmail to their manager(s) by using the data migration service during the deletion process. Transfer the former employees’ Google Drive files to a new owner.
BChange the Google account passwords of the former employees.
CSuspend the former employees’ Google accounts. Create an organizational unit (OU). Move the former employees into that OU.
DAssign an Archived User license to the former employees’ Google accounts.
Your organization allows employees to use their personal mobile devices to check their work emails. You need to remove the employee’s work email data from their phone when they leave the organization. What should you do?
ASet up basic mobile management on the devices.
BSet up advanced mobile management on the devices.
CSet up data protection rules to prevent data sharing externally.
DSet up 2SV authentication on the devices.
During a recent Google Meet video conference, several employees reported that they could not hear the presenters. The presenters confirmed that their laptops’ microphones were working. The affected employees were all using company-issued laptops. You need to quickly diagnose the source of the issue. What should you do first?
AVerify that the audio drivers on the affected laptops are up-to-date and functioning correctly.
BCheck the Admin console to determine whether there are recent Meet-related notifications or alerts.
CCheck if Context-Aware access rules were set to prevent Meet access from the user’s network location.
DUse the Meet quality tool for each affected user to analyze their microphone settings and configurations during the meeting.
The current data storage limit for the sales organizational unit (OU) at your company is set at 10GB per user. A subset of sales representatives in that OU need 100GB of storage across shared services. You need to increase the storage for only the subset of sales representatives by using the least disruptive approach and the fewest configuration steps. What should you do?
AMove the subset of users to a sub-OU, and assign a 100GB storage limit to that sub-OU.
BInstruct the subset of users to store their documents in a Shared Drive with a 100GB limit.
CChange the storage limit of the sales OU to 100GB.
DCreate a configuration group, and add the subset of users to that group. Set the group storage limit to 100GB.
Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?
ARedirect the acquired domain to Google’s MX records and add the account as a “send as” address.
BSet up the acquired agency as a secondary domain from the Manage domains page.
CSet up the acquired agency as a user alias domain from the Manage domains page.
DSet up the acquired agency as a secondary domain and swap it to the primary domain.
Your company is undergoing a regulatory compliance audit. As part of the audit, you are required to demonstrate that you can preserve all electronic communications related to a specific project for a potential legal discovery process. You need to configure Google Vault to accomplish this goal. What should you do?
AUse the security investigation report to show Vault log events.
BUse the search and export functionality to identify all relevant communications within the project timeframe.
CCreate a matter and a hold on all project-related data sources such as Email, Chat, and Drive within Google Workspace.
DCreate a custom retention policy for the project data. Ensure that the policy covers the required retention period.
Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?
ACreate a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.
BCreate a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.
CCreate a Google Group and update the settings to allow anyone in the organization to join the group.
DCreate a Google Group and appoint a group admin to manage the membership of this group.
A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?
APurchase and assign Archived User licenses to the former employees.
BTransfer the former employees’ files and data to active user accounts. Delete the former employees’ Workspace accounts.
CPurchase additional user licenses and suspend the former employees’ accounts.
DMove the former employees to their own organizational unit (OU) and disable access to Google services for that OU.
The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?
AInstruct the IT department to directly access and forward the relevant emails to the legal department.
BTemporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.
CAsk a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.
DUse Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.
Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentially leading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?
AAdd a banner to the newsletter that warns users that external sharing is prohibited.
BCreate a Gmail content compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected
CDevelop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.
DCreate a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.
Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?
ASet up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.
BConfigure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.
CEnable Protect against unauthenticated emails in Gmail Safety.
DEnable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.
You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?
AAutomate room creation by using a third-party app from the Google Workspace Marketplace.
BCreate a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.
CCreate each conference room individually in the Google Admin console. Add the features for each room.
DUse the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.
Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.
You need to enforce the new password policy in Google Workspace. What should you do?
AShare the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.
BEnable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.
CCreate a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.
DCreate a password policy in Active Directory. Enable password synchronization in GCDS.
Your company operates several primary care clinics where employees routinely work with protected health information (PHI). You are in the process of transitioning the organization to Google Workspace from a legacy communication and collaboration system. After you sign the Business Associate Agreement (BAA), you need to ensure that data is handled in compliance with regulations when using Google Workspace. What should you do?
AImplement a third-party backup service that is also compliant with Google Workspace core services.
BCreate a label for Google Drive content to help employees identify sensitive data.
CInstruct the staff to not store any PHI in Google Workspace core services, including Google Drive, Docs, Sheets, and Keep.
DDisable integrations with third-party apps and turn off non-core Google services.
You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?
AAnalyze the audit log in the Admin console for device and application activity.
BAnalyze the security investigation tool to access device log data.
CAnalyze the Google Workspace reporting section of the Admin console.
DAnalyze the User Accounts section in the Google Admin console.
A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?
AConduct a Vault search to find this email and identify if additional users were affected.
BConduct a search to find all emails sent by the sender by using the Gmail API.
CConduct an Email reports search to find this email and all of the email’s recipients.
DConduct a search in the security investigation tool to find this email, and identify whether additional users were affected.