Madeupcorp.com is in the process of migrating from a third-party email system to G Suite. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.
What should you do?
ARun the Transfer Tool for Unmanaged users.
BUse a Google Form to survey the Marketing department users.
CAssure the VP that there is no action required to configure G Suite.
DContact Google Enterprise Support to identify affected users.
Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say "Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE." You are responsible for making sure that users cannot remove the footer.
What should you do?
ASend an email to each sales person with the instructions on how to add the footer to their Signature.
BEnsure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.
CEnsure that each sales team is in their own OU, and configure the Append Footer with footer content.
DEnsure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.
What action should be taken to configure alerting related to phishing attacks?
ASet up a Token audit log event alert.
BSet up an Admin audit log event alert.
CSet up an email settings changed alert.
DSet up a suspicious login event alert.
A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
ATurn on password expiration.
BEnforce 2FA with a physical security key.
CUse a third-party identity provider.
DEnforce 2FA with Google Authenticator app.
After migrating to G Suite, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.
What should you do?
AAdd the legal team to the User Management Admin system role.
BAdd the legal team to the Google Vault Google Group.
CCreate a custom role with Google Vault access, and add the legal team.
DCreate a matter in Google Vault, and share with the legal team.
Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.
Which combination of attributes will meet this objective?
AName the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
BName the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
CName the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
DName the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.
What two features are essential to reconfigure in G Suite? (Choose two.)
AApps > add SAML apps to your domain.
BReconfigure user provisioning via Google Cloud Directory Sync.
CReplace the third-party IDP verification certificate.
DDisable SSO with third party IDP.
EEnable API Permissions for Google Cloud Platform.
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)
AMac OS
BWindows
CChrome OS
DiOS
ELinux
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.
What should you do?
AChange Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
BChange Enrollment Controls to Place Chrome device in user organization.
CChange Enrollment Controls to Keep Chrome device in current location.
DChange Enrolment Permissions to not allow users in this organization to enroll new devices.
A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges.
You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs.
What two actions should be taken on this call with the user? (Choose two.)
AAsk the user to send an email to you so you can check the headers.
BRecord a HAR file of the user composing a new email.
CTake screenshots of the user's screen when composing an email.
DUse the Email log search in the Admin panel.
ECheck the Users > App Users Activity report.
Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app.
What should you do?
AFor the Finance OU, enable the third-party app in SAML apps.
BFor the Finance OU, enable the third-party app in Marketplace Apps.
CAt the root level, disable the third-party app. For the Finance OU, allow users to install any application from the G Suite Marketplace.
DAt the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the G Suite Marketplace.
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant
Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.
What should you do?
ACreate a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
BCreate a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
CCreate a blocked senders list at the Sales OU that contains the mass email sender addresses.
DCreate an approved senders list at the Market Research OU that contains the mass email sender addresses.
The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue.
What two actions should you take? (Choose two.)
AObtain the message header and analyze using G Suite Toolbox.
BReview the contents of the messages in Google Vault.
CSet up a Gmail routing rule to whitelist the sender.
DConduct an Email log search to trace the message route.
EValidate that your domain is not on the Spamhaus blacklist.
Security and Compliance has identified that data is being leaked through a third-party application connected to G SuiteÑŽ You want to investigate using an audit log.
What log should you use?
AAdmin audit log
BSAML audit log
CDrive usage audit log
DOAuth Token audit log
Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using G Suite.
What should you do?
AEnable additional security verification via email.
BEnable authentication via the Google Authenticator.
CDeploy browser or device certificates via G Suite.
DConfigure USB Yubikeys for all users.
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:
✑ Control password policies.
✑ Make corporate apps available to the users.
✑ Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
ATurn on Advanced Mobile Management for the domain.