What should you do?

Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they...

September 7, 2024No CommentsREAD MORE +

How could you provide granular insight into what data third party applications are accessing?

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?A . Create a report using the OAuth Token Audit Activity logs.B...

September 7, 2024No CommentsREAD MORE +

What should you do?

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must...

September 7, 2024No CommentsREAD MORE +

What should you do?

After making a recent migration to Google Workspace, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in Google Workspace. You need to resolve this issue. What should you do?A . Train users to use...

September 7, 2024No CommentsREAD MORE +

What is the best way to set this up?

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?A...

September 6, 2024No CommentsREAD MORE +

What could be causing the sign-in issue?

You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no...

September 6, 2024No CommentsREAD MORE +

What step should you take to increase the visibility of such investigations?

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?A ....

September 5, 2024No CommentsREAD MORE +

Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features?

Your organization has just completed migrating users to Workspace. Many employees are concerned about their legacy Microsoft Office documents, including issues of access, editing, and viewing. Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features? (Choose two.)A . Configure Context-Aware Access policies to block...

September 5, 2024No CommentsREAD MORE +

What is the first step you should take to enable others to help manage the quarantine, while maintaining security?

Your admin quarantine is becoming a burden to manage due to a consistently high influx of messages that match the content compliance rule Your security team will not allow you to remove or relax this rule, and as a result, you need assistance processing the messages in the quarantine. What...

September 5, 2024No CommentsREAD MORE +

What should you do?

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access. What should you do?A . Turn on password expiration.B . Enforce 2FA with a physical security key.C...

September 5, 2024No CommentsREAD MORE +