How could you provide granular insight into what data third party applications are accessing?

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?A . Create a report using the OAuth Token Audit Activity logs.B...

September 28, 2023 No Comments READ MORE +

What should you do?

Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they...

September 27, 2023 No Comments READ MORE +

What should you do?

Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern. What should you do?A . Use the conflict account remove tool...

September 27, 2023 No Comments READ MORE +

What should your organization do?

Your organization is preparing to deploy Workspace and will continue using your company’s existing identity provider for authentication and single sign-on (SSO). In order to migrate data from an external system, you were required to provision each user’s account in advance. Your IT team and select users (~5% of the...

September 27, 2023 No Comments READ MORE +

Which two solutions would help you mitigate the risk at minimal cost?

Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office. You are asked to take...

September 27, 2023 No Comments READ MORE +

What should you do?

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?A . Assign the pre-built security admin role to the security team members.B ....

September 26, 2023 No Comments READ MORE +

What is the most logical reason for this issue?

As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore...

September 26, 2023 No Comments READ MORE +

What could be causing the sign-in issue?

You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no...

September 26, 2023 No Comments READ MORE +

What should you do?

After making a recent migration to Google Workspace, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in Google Workspace. You need to resolve this issue. What should you do?A . Train users to use...

September 26, 2023 No Comments READ MORE +

What should you do?

After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff. What should you do?A . Create a custom Apps...

September 25, 2023 No Comments READ MORE +