What should you do?
Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts. What should you do?A . Enable Enforce Strong Password policy.B . Enable Employee ID...
What should you do?
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they...
What two features are essential to reconfigure in Google Workspace?
Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services. What two features are essential to reconfigure...
What should you do?
After making a recent migration to Google Workspace, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in Google Workspace. You need to resolve this issue. What should you do?A . Train users to use...
Which scenario could require an alternative deployment strategy?
Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration. Which scenario could require an alternative deployment strategy? A. Some of your Active Directory groups have sensitive group...
What action should you take to troubleshoot this issue with the user?
A user is reporting that after they sign in to Gmail, their labels are not loading and buttons are not responsive. What action should you take to troubleshoot this issue with the user?A . Collect full message headers for examination.B . Check whether the issue occurs when the user authenticates...
How would you audit access to documents that the user shared inappropriately?
Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?A . Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is...
What steps should you take from the admin panel to prevent users from copying data from work to non-work apps on iOS devices?
Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app. What...
What should you do?
Your organization implemented Single Sign-On (SSO) for the multiple cloud-based services it uses. During authentication, one service indicates that access to the SSO provider is not possible due to invalid information. What should you do?A . Update the validation certificate.B . Verify that the Audience element in the SAML Response...
Which actions should you take first to ensure that you are compliant with Infosec policy?
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access...