Google Google Workspace Administrator Professional Google Workspace Administrator Online Training
Google Google Workspace Administrator Online Training
The questions for Google Workspace Administrator were last updated at Nov 19,2024.
- Exam Code: Google Workspace Administrator
- Exam Name: Professional Google Workspace Administrator
- Certification Provider: Google
- Latest update: Nov 19,2024
Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date.
What corrective action should you take to allow the users to sign in again?
- A . Disable 2-Step Verification per organizational unit so the affected users can sign in.
- B . Move the affected users into the exception group temporarily so they can set up 2-Step
Verification, and then remove them from the exception group after successful sign-in is confirmed. - C . Disable 2-Step Verification organization-wide so all users can successfully sign in.
- D . Move the affected users into the exception group permanently so they do not have to use 2-Step Verification going forward.
The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing.
What should you do?
- A . Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
- B . Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
- C . Create two Drive Audit Alerts, one for each user, where the Visibility is “Shared Externally,” and email them to the Director.
- D . Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.
What should you do?
- A . Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
- B . Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
- C . Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
- D . Create an approved senders list at the Market Research OU that contains the mass email sender addresses.
The nature of your organization’s business makes your users susceptible to malicious email attachments.
How should you implement a scan of all incoming email attachments?
- A . Configure a safety rule to protect against encrypted attachments from untrusted senders
- B . Configure a safety rule to protect against attachments with scripts from untrusted senders.
- C . In the security sandbox section, enable virtual execution of attachments for (he targeted OU
- D . In the security sandbox section, enable virtual execution of attachments for the entire organization.
A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations.
What step should you take to increase the visibility of such investigations?
- A . Assign the ‘Services Admin’ role to an administrator with ‘Super Admin’ privileges.
- B . Create a ‘Custom Role’ and add all the Google Vault privileges for a new administrator.
- C . Validate that the new administrator has access to Google Vault.
- D . Create a ‘Custom Role’ and add the ability to manage Google Vault matters, holds, searches, and exports.
Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration.
Which scenario could require an alternative deployment strategy?
- A . Some of your Active Directory groups have sensitive group membership.
- B . Some of the Active Directory groups do not have owners.
- C . Some of the Active Directory groups have members external to organization.
- D . Some of the Active Directory groups do not have email addresses.
As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager. As the Workspace Administrator, what should you do to preserve this user’s Drive data?
- A . In the user deletion process, select “Transfer” in the data in other apps section and add the manager’s email address.
- B . Use Google Vault to set a retention period on the OU where the users reside.
- C . Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.
- D . Ask the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.
A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team.
What would be the most secure method to enable external sharing for this set of users?
- A . Download and attach the documents to a Gmail message, and send them to the external vendor.
- B . Move all users from the finance org unit to the HR org unit.
- C . Enable ‘Visitor Sharing’ for the entire finance org unit.
- D . Create a group with the finance and HR users who need to share externally.
As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore from one satellite office and that they receive an error message that “a company policy is blocking access to this app.” The users have no issue with Gmail or Google Calendar. While investigating, you learn that both this office’s Internet Service Provider (ISP) and the global IP address when accessing the internet were changed over the weekend.
What is the most logical reason for this issue?
- A . An access level was defined based on the IP range and applied to Google Drive via Context-Aware Access.
- B . Under Drive and Docs > Sharing Settings, the “Whitelisted domains” list needs to be updated to add the new ISP domain.
- C . The Network Mask defined in Security > Settings > SSO with 3rd Party IdPs should be updated to reflect the new IP range.
- D . You need to raise a ticket to Google Cloud Support to have your new IP ranges registered for Drive API access.
Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled.
What two actions should you take to support the chief security officer’s request? (Choose two.)
- A . Review who has viewed files using the Google Drive Activity Dashboard.
- B . Create an alert from Drive Audit reports to notify of external file sharing.
- C . Review total external sharing in the Aggregate Reports section.
- D . Create a custom Dashboard for external sharing in the Security Investigation Tool.
- E . Automatically block external sharing using DLP rules.