A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?
A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?A . Use Security Investigation Tool to Search Google Drive events for all of the user's documents, and use Google Admin >...
How can you monitor increases in user reported Spam as identified by Google?
How can you monitor increases in user reported Spam as identified by Google?A . Review post-delivery activity in the Email logs. B. Review user-reported spam in the Investigation Tool. C. Review spike in user-reported spam in the Alert center. D. Review post-delivery activity in the BigQuery Export.View AnswerAnswer: C Explanation:...
What steps should you take to troubleshoot this issue?
Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?A . Reinstall Password Sync on all domain controllers. B....
What step do you take to populate contact information for all users?
You act as the Google Workspace Administrator for a company that has just acquired another organization. The acquired company will be migrated into your Workspace environment in 6 months. Management has asked you to ensure that the Google Workspace users you currently manage can efficiently access rich contact information in...
What should you do?
Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app. What should you do?A . For the Finance...
What action should be taken to configure alerting related to phishing attacks?
What action should be taken to configure alerting related to phishing attacks?A . Set up a Token audit log event alert. B. Set up an Admin audit log event alert. C. Set up an email settings changed alert. D. Set up a suspicious login event alert.View AnswerAnswer: D Explanation: Reference:...
You are in charge of automating and configuring Google Cloud Directory Sync for your organization. Within the config manager, how can you proactively prevent applying widespread deletions within your Workspace environment if your company’s LDAP undergoes a substantial modification?
You are in charge of automating and configuring Google Cloud Directory Sync for your organization. Within the config manager, how can you proactively prevent applying widespread deletions within your Workspace environment if your company’s LDAP undergoes a substantial modification?A . Manually run Google Cloud Directory Sync only after performing a...
What should your organization do?
Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the...
What should you do?
With the help of a partner, you deployed Google Workspace last year and have seen the rapid pace of innovation and development within the platform. Your CIO has requested that you develop a method of staying up-to-date on all things Google Workspace so that you can be prepared to take...
What should you do?
The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one...