What two things should you do?

Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else. What two things should you do? (Choose two.)A . Disable Guest Mode and Public Sessions.B . Enable a Device Policy...

September 13, 2024No CommentsREAD MORE +

What two actions should you take?

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by...

September 13, 2024No CommentsREAD MORE +

How can you configure access for these users to match the team's request?

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access...

September 12, 2024No CommentsREAD MORE +

What should you do?

Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request. What should you do?A . Create a content...

September 12, 2024No CommentsREAD MORE +

What two actions should you take?

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided...

September 11, 2024No CommentsREAD MORE +

What is the best way to achieve this for these new users, without updating the information of pre-existing users?

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these...

September 11, 2024No CommentsREAD MORE +

What two actions should you take?

Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)A . Whitelist Trusted AppsB . Disable the Drive SDKC . Restrict API scopesD . Disable add-ons...

September 11, 2024No CommentsREAD MORE +

How can you create a system to assign conversations to different receptionists using Workspace?

Your company has numerous locations throughout the world. Each of these locations has multiple office managers that field questions from employees through an email alias. Some questions have not been answered by an office manager. How can you create a system to assign conversations to different receptionists using Workspace?A ....

September 9, 2024No CommentsREAD MORE +

What corrective action should you take to allow the users to sign in again?

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?A...

September 8, 2024No CommentsREAD MORE +

What should you do?

Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts. What should you do?A . Enable Enforce Strong Password policy.B . Enable Employee ID...

September 8, 2024No CommentsREAD MORE +