Which actions should you take first to ensure that you are compliant with Infosec policy?
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access...
How could you provide granular insight into what data third party applications are accessing?
Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?A . Create a report using the OAuth Token Audit Activity logs.B...
What could be causing the sign-in issue?
You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no...
What would be the most secure method to enable external sharing for this set of users?
A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?A . Download and...
What should you do?
Your organization wants to grant Google Vault access to an external regulatory authority. In an effort to comply with an investigation, the external group needs the ability to view reports in Google Vault. What should you do?A . Create accounts for external users and assign Vault privileges.B . Share Vault...
What steps should you take from the admin panel to prevent users from copying data from work to non-work apps on iOS devices?
Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What...
Which configuration should you implement?
You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured. Which configuration...
How would you audit access to documents that the user shared inappropriately?
Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?A . Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is...
What MDM configuration is needed to meet this requirement?
Your Security Officer ran the Security Health Check and found the alert that “Installation of mobile applications from unknown sources” was occurring. They have asked you to find a way to prevent that from happening. Using Mobile Device Management (MDM), you need to configure a policy that will not allow...
What is the best way to set this up?
The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?A...