Google Google Workspace Administrator Professional Google Workspace Administrator Online Training
Google Google Workspace Administrator Online Training
The questions for Google Workspace Administrator were last updated at Apr 27,2025.
- Exam Code: Google Workspace Administrator
- Exam Name: Professional Google Workspace Administrator
- Certification Provider: Google
- Latest update: Apr 27,2025
After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff.
What should you do?
- A . Create a custom Apps Script to reset passwords.
- B . Use a third-party tool for password recovery.
- C . Enable non-admin password recovery.
- D . Create a Google form to submit reset requests.
You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking.
What could be the issue?
- A . Automatic Room Replacement does not work on recurring events.
- B . This feature requires calendar event owners to have the Buildings and resources administrator privilege
- C . The calendar resources do not have the Resource Category configured as CONFERENCE_ROOM
- D . The events have more than 20 attendees.
Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit.
What should you do?
- A . From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.
- B . From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.
- C . From the Google Workspace Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.
- D . From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.
Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else.
What two things should you do? (Choose two.)
- A . Disable Guest Mode and Public Sessions.
- B . Enable a Device Policy of Sign In Screen and add the employee email address.
- C . Enroll a 2-Factor hardware key on the device using the employee email address.
- D . Enable a User Policy of Multiple Sign In Access and add just the employee email address.
- E . Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.
An end user informs you that they are having issues receiving mail from a specific sender that is external to your organization. You believe the issue may be caused by the external entity’s SPF record being incorrectly configured.
Which troubleshooting step allows you to examine the full message headers for the offending message to determine why the messages are not being delivered?
- A . Use the Postmaster Tools API to pull the message headers.
- B . Use the Email Log Search to directly review the message headers.
- C . Use the Security Investigation Tool to review the message headers.
- D . Perform an SPF record check on the domain to determine whether their SPF record is valid.
The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members.
What is the best way to set this up?
- A . Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.
- B . Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.
- C . Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.
- D . Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.
Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.
You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing.
Which two solutions would help you mitigate the risk at minimal cost? Choose 2 answers
- A . Deploy 2-Step Verification for all users who have security keys.
- B . Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.
- C . Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.
- D . Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.
- E . For all executives, create new accounts with random characters to match Google best practices, migrate data from the former accounts, and then delete them.
Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.
What should you do?
- A . Use the conflict account remove tool to remove the accounts from Google Workspace.
- B . Rename the accounts to [email protected], and recreate the accounts.
- C . Ask users to request a new Google Workspace account from your local admin.
- D . Use the Transfer tool for unmanaged users to find the conflict accounts.
Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app.
What steps should you take from the admin panel to prevent users from copying data from work to non-work apps on iOS devices?
- A . Navigate to “Data Protection” setting in Google Admin Console’s Device management section and disable the “Allow users to copy data to personal apps” checkbox.
- B . Disable “Open Docs in Unmanaged Apps” setting in Google Admin Console’s Device management section.
- C . Navigate to Devices > Mobile and endpoints > Universal Settings > General and turn on Basic Mobile Management.
- D . Clear the “Allow items created with managed apps to open in unmanaged apps” checkbox.
Your organization’s Sales Department uses a generic user account ([email protected]) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.
What should you do?
- A . Configure a Google Group as an email list.
- B . Delegate email access to department employees.
- C . Configure a Google Group as a collaborative inbox.
- D . Configure a Google Group, and set the Access Level to Announcement Only.