What two actions should be taken on this call with the user?
A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges. You have been tasked with...
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)A . Mac OSB . WindowsC . Chrome OSD . iOSE . LinuxView AnswerAnswer: CD Explanation: Reference: https://support.google.com/a/answer/2634553?hl=en
What action should you take?
Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees...
What should you do?
Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using G Suite. What should you do?A . Enable additional security verification via email.B ....
What two steps are required before configuring the device policies?
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices: - Control password policies. - Make corporate apps available to the users. - Remotely wipe the device if it's lost or compromised What...
What two features are essential to reconfigure in G Suite?
Your company has decided to change SSO providers. Instead of authenticating into G Suite and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services. What two features are essential to reconfigure...
What should you do?
Your organization's Sales Department uses a generic user account ([email protected]) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email...
Where do you find the information your CISO is interested in seeing?
Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month. Where...
What should you do?
Madeupcorp.com is in the process of migrating from a third-party email system to G Suite. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You...
What two actions should you take to support the chief security officer's request?
Your organization is on G Suite Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other G Suite customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the...