How would you audit access to documents that the user shared inappropriately?

Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?A . Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is...

September 2, 2024No CommentsREAD MORE +

How do you find this information?

As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages―whether spam, not spam, or phishing―for a specific time period. How do you find this information?A . Open Admin Console > Security > Dashboard > User Reports.B . Open Admin Console >...

September 2, 2024No CommentsREAD MORE +

What should you do?

Your organization implemented Single Sign-On (SSO) for the multiple cloud-based services it uses. During authentication, one service indicates that access to the SSO provider is not possible due to invalid information. What should you do?A . Update the validation certificate.B . Verify that the Audience element in the SAML Response...

September 1, 2024No CommentsREAD MORE +

What advice would you give the development team in order to avoid the issue?

Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company's development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API. While doing the original test before...

August 30, 2024No CommentsREAD MORE +

What should you do?

Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, [email protected] to the cloud platform’s email address, [email protected]. As a security measure, you have mail forwarding disabled at the domain level. What should...

August 30, 2024No CommentsREAD MORE +

What steps should you take?

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your-...

August 30, 2024No CommentsREAD MORE +

What should you do?

Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace. What should you do?A . Turn on the Chromebook and...

August 30, 2024No CommentsREAD MORE +

What step should be taken?

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?A . Use the security center to remove the messages from users' mailboxesB . Use Google Vault to remove these...

August 30, 2024No CommentsREAD MORE +