What should you do?
After migrating to G Suite, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request. What should you do?A . Add the legal team to the User Management Admin...
What should you do?
Your employer, a media and entertainment company, wants to provision G Suite Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact...
What two features are essential to reconfigure in G Suite?
Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services. What two features are essential to reconfigure...
Where should you enable this in the Chrome management settings?
A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network. Where should you enable this in the Chrome management settings?A . Randomly scatter auto-updates.B . Update...
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)A . Mac OSB . WindowsC . Chrome OSD . iOSE . LinuxView AnswerAnswer: CD Explanation: Reference: https://support.google.com/a/answer/2634553?hl=en
Where do you find the information your CISO is interested in seeing?
Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month. Where...
What two steps are required before configuring the device policies?
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices: - Control password policies. - Make corporate apps available to the users. - Remotely wipe the device if it's lost or compromised What...
What should you do?
Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app. What should you do?A . For the Finance...
What should you do?
Madeupcorp.com is in the process of migrating from a third-party email system to G Suite. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You...
What should you do?
Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.”...