What corrective action should you take to allow the users to sign in again?

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?A...

September 8, 2024 No Comments READ MORE +

What should you do?

Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts. What should you do?A . Enable Enforce Strong Password policy.B . Enable Employee ID...

September 8, 2024 No Comments READ MORE +

What should you do?

Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they...

September 7, 2024 No Comments READ MORE +

How could you provide granular insight into what data third party applications are accessing?

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?A . Create a report using the OAuth Token Audit Activity logs.B...

September 7, 2024 No Comments READ MORE +

What should you do?

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must...

September 7, 2024 No Comments READ MORE +

What should you do?

After making a recent migration to Google Workspace, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in Google Workspace. You need to resolve this issue. What should you do?A . Train users to use...

September 7, 2024 No Comments READ MORE +

What is the best way to set this up?

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?A...

September 6, 2024 No Comments READ MORE +

What could be causing the sign-in issue?

You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no...

September 6, 2024 No Comments READ MORE +

What step should you take to increase the visibility of such investigations?

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?A ....

September 5, 2024 No Comments READ MORE +

Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features?

Your organization has just completed migrating users to Workspace. Many employees are concerned about their legacy Microsoft Office documents, including issues of access, editing, and viewing. Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features? (Choose two.)A . Configure Context-Aware Access policies to block...

September 5, 2024 No Comments READ MORE +