Google Google Workspace Administrator Professional Google Workspace Administrator Online Training
Google Google Workspace Administrator Online Training
The questions for Google Workspace Administrator were last updated at Nov 19,2024.
- Exam Code: Google Workspace Administrator
- Exam Name: Professional Google Workspace Administrator
- Certification Provider: Google
- Latest update: Nov 19,2024
Your organization’s information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization.
How would you audit access to documents that the user shared inappropriately?
- A . Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is [email protected].
- B . Have the super administrator use the Security API to audit Drive access.
- C . As a super administrator, change the access on externally shared Drive files manually under [email protected].
- D . Open Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for [email protected].
Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool.
What should you do?
- A . Assign the pre-built security admin role to the security team members.
- B . Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.
- C . Assign the Super Admin Role to the security team members.
- D . Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.
A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site.
What is the first step to start an investigation into this leak?
- A . Delete the user’s account in the Admin Console.
- B . Transfer data between end user Workspace accounts.
- C . Instruct a Google Vault admin to create a matter, and place all the user data on ‘hold.’
- D . Use Google Vault to export all the user data and share among the security team.
Your organization has just completed migrating users to Workspace. Many employees are concerned about their legacy Microsoft Office documents, including issues of access, editing, and viewing.
Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features? (Choose two.)
- A . Configure Context-Aware Access policies to block access to Microsoft Office applications.
- B . Demonstrate the ability to convert Office documents to native Google file format from Drive.
- C . Demonstrate and train users to use the Workspace Migrate tool.
- D . Deliver training sessions that show the methods to access and edit native Office files in Drive, the Workspace file editors, and Drive for Desktop.
- E . Continue to use installed Office applications along with Google Drive for Desktop.
Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the organization) have been using Workspace for configuration and testing purposes. The remainder of the organization can technically access their accounts now, but the IT team wants to block their access until the migrations are complete.
What should your organization do?
- A . Remove Google Workspace license to prevent users from accessing their accounts now.
- B . Suspend users that the organization does not wish to have access.
- C . Add the users to the OU with all services disabled.
- D . Use Context-Aware Access to simultaneously block access to all services for all users and allow access to all services for the allowed users.
A user is reporting that after they sign in to Gmail, their labels are not loading and buttons are not responsive.
What action should you take to troubleshoot this issue with the user?
- A . Collect full message headers for examination.
- B . Check whether the issue occurs when the user authenticates on a different device or a new incognito window.
- C . Check whether a ping test to service.gmail.com (pop.gmail.com or imap.gmail.com) is successful.
- D . Check whether traceroute to service.gmail.com (pop.gmail.com or imap.gmail.com) is successful.
Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them.
How could you provide granular insight into what data third party applications are accessing?
What should you do?
- A . Create a report using the OAuth Token Audit Activity logs.
- B . Create a report using the Calendar Audit Activity logs.
- C . Create a report using the Drive Audit Activity logs.
- D . Create a reporting using the API Permissions logs for Installed Apps.
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted.
The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access immediately if all of the following conditions are met:
✑ Access to the app is restricted to specific individuals by request only.
✑ The app does not have the ability to read or manage emails.
✑ Immediate notice is given to the Infosec team, followed by the submission of a security risk analysis report within 14 days.
Which actions should you take first to ensure that you are compliant with Infosec policy?
- A . Move the Senior VP to a sub-OU before enabling Marketplace Settings > “Allow Users to Install Any App from Google Workspace Marketplace.”
- B . Confirm that the Senior VP’s OU has the following Gmail setting disabled before whitelisting the app: “Let users delegate access to their mailbox.”
- C . Add the Marketplace app, then review the authorized scopes in Security > Manage API client access.
- D . Search the Google Workspace support forum for feedback about the app to include in the risk analysis report.
A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
- A . Turn on password expiration.
- B . Enforce 2FA with a physical security key.
- C . Use a third-party identity provider.
- D . Enforce 2FA with Google Authenticator app.
Your organization wants to grant Google Vault access to an external regulatory authority. In an effort to comply with an investigation, the external group needs the ability to view reports in Google Vault.
What should you do?
- A . Create accounts for external users and assign Vault privileges.
- B . Share Vault access with external users.
- C . Assign an Archived User license to the external users.
- D . Temporarily assign the super admin role to the users