How should you implement a scan of all incoming email attachments?

The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?A . Configure a safety rule to protect against encrypted attachments from untrusted sendersB . Configure a safety rule to protect against attachments with scripts from...

September 21, 2023 No Comments READ MORE +

What should you do?

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access. What should you do?A . Turn on password expiration.B . Enforce 2FA with a physical security key.C...

September 20, 2023 No Comments READ MORE +

What steps should you take from the admin panel to prevent users from copying data from work to non-work apps on iOS devices?

Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What...

September 20, 2023 No Comments READ MORE +

What step should be taken?

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?A . Use the security center to remove the messages from users' mailboxesB . Use Google Vault to remove these...

September 19, 2023 No Comments READ MORE +