What would be the most secure method to enable external sharing for this set of users?

A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?A . Download and...

September 20, 2024No CommentsREAD MORE +

What should you do?

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You...

September 20, 2024No CommentsREAD MORE +

What are two ways you should accomplish this?

Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data...

September 19, 2024No CommentsREAD MORE +

Which scenario could require an alternative deployment strategy?

Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration. Which scenario could require an alternative deployment strategy? A. Some of your Active Directory groups have sensitive group...

September 19, 2024No CommentsREAD MORE +

What are two options to meet this requirement?

Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail’s address autocomplete for all users in the domain. What are two options to meet this requirement? (Choose two.)A . Use the Directory API...

September 18, 2024No CommentsREAD MORE +

What could be the issue?

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?A . Automatic Room Replacement does not work on recurring events.B . This feature requires calendar event owners to have the Buildings and resources...

September 18, 2024No CommentsREAD MORE +

What is the first step to start an investigation into this leak?

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?A . Delete...

September 18, 2024No CommentsREAD MORE +

What should you do?

Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?A . Assign the pre-built security admin role to the security team members.B ....

September 18, 2024No CommentsREAD MORE +

What should you do?

After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff. What should you do?A . Create a custom Apps...

September 17, 2024No CommentsREAD MORE +

What else can you do to increase your organization's defense-in-depth strategy?

The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's...

September 17, 2024No CommentsREAD MORE +