What two actions should you take?

Your organization syncs directory data from Active Directory to Google Workspace via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user’s data. What two actions...

December 23, 2022 No Comments READ MORE +

What step should you take to increase the visibility of such investigations?

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?A ....

December 23, 2022 No Comments READ MORE +

What should you do?

Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in Google Workspace Admin Panel is time-consuming and prone...

December 22, 2022 No Comments READ MORE +

What two actions should you take to support the chief security officer's request?

Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the...

December 22, 2022 No Comments READ MORE +

What security measures should you implement to secure data?

Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker. What security measures should you implement to secure data?A . Use...

December 21, 2022 No Comments READ MORE +

What should you do?

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to...

August 29, 2022 No Comments READ MORE +

Which combination of attributes will meet this objective?

Your company’s compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company’s account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet...

August 29, 2022 No Comments READ MORE +

What log should you use?

Security and Compliance has identified that data is being leaked through a third-party application connected to G Suiteю You want to investigate using an audit log. What log should you use?A . Admin audit logB . SAML audit logC . Drive usage audit logD . OAuth Token audit logView AnswerAnswer:...

August 29, 2022 No Comments READ MORE +

What should you do?

A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access. What should you do?A . Turn on password expiration.B . Enforce 2FA with a physical security key.C...

August 27, 2022 No Comments READ MORE +

What two actions should you take to support the chief security officer's request?

Your organization is on G Suite Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other G Suite customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the...

August 27, 2022 No Comments READ MORE +