How should you implement a scan of all incoming email attachments?
The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?A . Configure a safety rule to protect against encrypted attachments from untrusted sendersB . Configure a safety rule to protect against attachments with scripts from...
What should you do?
Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?A . Assign the pre-built security admin role to the security team members.B ....
What is the first step you should take to troubleshoot this issue for the individual user?
A user joined your organization and is reporting that every time they start their computer they are asked to sign in. This behavior differs from what other users within the organization experience. Others are prompted to sign in biweekly. What is the first step you should take to troubleshoot this...
How would you audit access to documents that the user shared inappropriately?
Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?A . Open Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is...
What two actions should you take?
HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by...
Which actions should you take first to ensure that you are compliant with Infosec policy?
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access...
What should you do?
Your organization's Sales Department uses a generic user account ([email protected]) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email...
What should you do?
Your organization is concerned with the increasing threat of phishing attacks that may impact users. Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts. What should you do?A . Enable Enforce Strong Password policy.B . Enable Employee ID...
What should you do?
Your company is using Google Workspace Enterprise Plus, and the Human Resources (HR) department is asking for access to Work Insights to analyze adoption of Google Workspace for all company employees. You assigned a custom role with the work Insights permission set as “view data for all teams” to the...
What should you do?
The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing. What should you do?A . Create a Google Group that has the two auditors as members, and then create...