What should you do?
A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access. What should you do?A . Turn on password expiration.B . Enforce 2FA with a physical security key.C...
What should you do?
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to...
What should you do?
Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named G Suite accounts (e.g., [email protected], user2@yourcompany.com, [email protected]). The manager of this program wants all email to these accounts routed to the manager's mailbox account also. What should you do?A...
What should you do?
After migrating to G Suite, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request. What should you do?A . Add the legal team to the User Management Admin...
What log should you use?
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suiteю You want to investigate using an audit log. What log should you use?A . Admin audit logB . SAML audit logC . Drive usage audit logD . OAuth Token audit logView AnswerAnswer:...
What should you do?
Your employer, a media and entertainment company, wants to provision G Suite Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact...
What should you do?
Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in G Suite Admin Panel is time-consuming and prone...
What action should be taken to configure alerting related to phishing attacks?
What action should be taken to configure alerting related to phishing attacks?A . Set up a Token audit log event alert.B . Set up an Admin audit log event alert.C . Set up an email settings changed alert.D . Set up a suspicious login event alert.View AnswerAnswer: D Explanation: Reference:...
What should you do?
Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.”...
How should you store data for this situation?
Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain G Suite data should be stored in a separate backup environment. How should you store data...