What is the most logical reason for this issue?

As the newly hired Admin in charge of Google Workspace, you learn that the organization has been using Google Workspace for months and has configured several security rules for accessing Google Drive. A week after you start your role, users start to complain that they cannot access Google Drive anymore...

September 13, 2024 No Comments READ MORE +

What should you do?

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings...

September 13, 2024 No Comments READ MORE +

What two things should you do?

Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else. What two things should you do? (Choose two.)A . Disable Guest Mode and Public Sessions.B . Enable a Device Policy...

September 13, 2024 No Comments READ MORE +

What two actions should you take?

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by...

September 13, 2024 No Comments READ MORE +

How can you configure access for these users to match the team's request?

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access...

September 12, 2024 No Comments READ MORE +

What should you do?

Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request. What should you do?A . Create a content...

September 12, 2024 No Comments READ MORE +

What two actions should you take?

The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided...

September 11, 2024 No Comments READ MORE +

What is the best way to achieve this for these new users, without updating the information of pre-existing users?

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these...

September 11, 2024 No Comments READ MORE +

What two actions should you take?

Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)A . Whitelist Trusted AppsB . Disable the Drive SDKC . Restrict API scopesD . Disable add-ons...

September 11, 2024 No Comments READ MORE +

How can you create a system to assign conversations to different receptionists using Workspace?

Your company has numerous locations throughout the world. Each of these locations has multiple office managers that field questions from employees through an email alias. Some questions have not been answered by an office manager. How can you create a system to assign conversations to different receptionists using Workspace?A ....

September 9, 2024 No Comments READ MORE +