The nature of your organization’s business makes your users susceptible to malicious email attachments.
How should you implement a scan of all incoming email attachments?
A . Configure a safety rule to protect against encrypted attachments from untrusted senders
B . Configure a safety rule to protect against attachments with scripts from untrusted senders.
C . In the security sandbox section, enable virtual execution of attachments for (he targeted OU
D . In the security sandbox section, enable virtual execution of attachments for the entire organization.
Answer: D
Latest Google Workspace Administrator Dumps Valid Version with 77 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund