What corrective action should you take to allow the users to sign in again?

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?A...

October 3, 2023 No Comments READ MORE +

What should you do?

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must...

October 3, 2023 No Comments READ MORE +

What could be the issue?

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?A . Automatic Room Replacement does not work on recurring events.B . This feature requires calendar event owners to have the Buildings and resources...

October 3, 2023 No Comments READ MORE +

What are two options to meet this requirement?

Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail’s address autocomplete for all users in the domain. What are two options to meet this requirement? (Choose two.)A . Use the Directory API...

October 3, 2023 No Comments READ MORE +

What could be the issue?

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?A . Automatic Room Replacement does not work on recurring events.B . This feature requires calendar event owners to have the Buildings and resources...

October 2, 2023 No Comments READ MORE +

What two actions should you take to support the chief security officer's request?

Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the...

October 2, 2023 No Comments READ MORE +

What is the first step to start an investigation into this leak?

A disgruntled employee has left your company and deleted all their email messages and files in Google Drive. The security team is aware that some intellectual property may have surfaced on a public social media site. What is the first step to start an investigation into this leak?A . Delete...

October 2, 2023 No Comments READ MORE +

What two things should you do?

Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else. What two things should you do? (Choose two.)A . Disable Guest Mode and Public Sessions.B . Enable a Device Policy...

October 2, 2023 No Comments READ MORE +

What two actions should you take?

Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)A . Whitelist Trusted AppsB . Disable the Drive SDKC . Restrict API scopesD . Disable add-ons...

October 2, 2023 No Comments READ MORE +

What two actions should you take?

Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)A . Whitelist Trusted AppsB . Disable the Drive SDKC . Restrict API scopesD . Disable add-ons...

October 2, 2023 No Comments READ MORE +