1
Q

Your organization has been using Google Workspace for almost a year, and your annual security and risk assessment initiative is approaching. In preparation for the risk assessment, you want to quickly review all the security-related settings for Gmail, Drive, and Calendar, and identify the ones that may be posing risk. What should you do?
A. Review all the alerts in the Alert center.
B. Review the Security health page in the Admin console.
C. Review all settings for each organizational unit (OU) separately because it is the only way to see the security settings for Workspace apps.
D. Review the Gmail, Drive, and Calendar reports in the Reporting section in the Admin console.

A

B. Review the Security health page in the Admin console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Employees at your organization can log into any third party applications they need for work-related reasons by using their Google Workspace sign-in. Your organization’s security team has asked you to present a list of applications that have access to the data in your Google Workspace domain. What should you do?
A. Download a list of external apps from the Manage Google login access section within the app access control page.
B. Download a list from the Accessed apps section of the app access control page.
C. Download a list of external apps from the Settings page within the app access control page.
D. Download a list from the Google Services section of the app access control page.

A

B. Download a list from the Accessed apps section of the app access control page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your organization has a group of users who interact with sensitive information and their accounts contain valuable files. You need to protect these users from targeted online attacks. What should you do?
A. Enable 2-Step Verification for those users and recommend they use Google Authenticator.
B. Enable 2-Step Verification for those users and recommend they use SMS codes.
C. Disable password recovery for end users.
D. Enroll all accounts for those users in the Advanced Protection Program.

A

D. Enroll all accounts for those users in the Advanced Protection Program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An employee at your organization is experiencing video call issues in Google Meet, and they were unable to resolve the issues by themselves. You need to troubleshoot the issue. What should you do first?
A. View the Meet quality report of the employee.
B. Ask your network administrator to add the dedicated Meet IP address range for your users.
C. Restart the device of the employee.
D. Check the Meet settings of the employee.

A

A. View the Meet quality report of the employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your organization is moving from a legacy mail system to Google Workspace. This move will happen in phases. During the first phase, some of the users in the domain are set up to use a different identity provider (IdP) for logging in. You need to set up multiple IdPs for various users. What should you do?
A. Enable single sign-on (SSO) with third-party identity providers and exclude the users who are using a different provider.
B. Enable single sign-on (SSO) with Cloud Identity, and use Cloud Directory Sync to manage multiple identity providers.
C. Create Security Assertion Markup Language (SAML) based single sign-on (SSO) profiles and assign them to specific organizational units or groups of users.
D. Nothing. Google uses cookies to establish a user’s relationship to a device. This will cover multiple identity providers.

A

C. Create Security Assertion Markup Language (SAML) based single sign-on (SSO) profiles and assign them to specific organizational units or groups of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your organization has users in the United States and Europe. For compliance reasons, you want to ensure that user data is always stored in the region where the user is located. What should you do?
A. Create two Google Groups titled “United States” and “Europe.” Assign users to either group based on location.
B. Specify a data region policy for each Organizational Unit (OU) where users are grouped by location.
C. Populate the Address field on each user record, ensuring the country information is accurate.
D. Do nothing. No extra configuration is needed because user data is always stored in the region the user is located.

A

B. Specify a data region policy for each Organizational Unit (OU) where users are grouped by location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work at a large global holding firm with multiple companies that are united under one Google Workspace deployment. You must ensure that employees can only access documents at the company in which they are employed. What should you do?
A. Create a User group for each company and change Google Drive sharing settings to block external sharing.
B. Create an organizational unit (OU) for each company and disable file sharing.
C. Set up data loss prevention (DLP) rules to prevent specific documents from being shared.
D. Set up Google Drive trust rules to prevent access to documents from individual companies.

A

D. Set up Google Drive trust rules to prevent access to documents from individual companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your default Vault retention policy for Gmail is set to 365 days. Your legal department has just informed you that emails sent and received by the customer support department are sensitive, and must be retained for only 30 days. You must enforce this new retention policy in the simplest way. What should you do?
A. Change the current default retention policy in Vault for Gmail to 30 days, and apply it to the customer support organizational unit (OU). Configure a custom retention policy for Gmail for 365 days for your domain.
B. Create two custom retention policies in Vault: one for 30 days that is applied to the customer support organizational unit (OU), and one for 365 days that is applied to all other OUs in your directory.
C. Change the current default retention policy for Gmail to 30 days. Configure two custom retention policies in Vault: one for 30 days that is applied to the customer support organizational unit (OU), and one for 365 days that is applied to all other OUs in your directory.
D. Create a custom retention policy in Vault for Gmail for 30 days, and apply it to the customer support organizational unit (OU).

A

D. Create a custom retention policy in Vault for Gmail for 30 days, and apply it to the customer support organizational unit (OU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Employees at your organization frequently and mistakenly delete important emails that they receive from your payroll department. The employees have to file support tickets for the IT team to find and restore these emails. You must provide an automated solution that minimizes IT overhead and prevents these emails from being permanently deleted from their inboxes. What should you do?
A. Create a content compliance rule that targets internal messages. Use an advanced content match for the sender header to match the payroll department’s email. Quarantine the message so that administrators can review the email before they release it to the user.
B. Create an Apps Script project that uses the Gmail API to find any recently deleted emails and automatically restore them to the inboxes. Set the script trigger to be time-driven and run every hour.
C. Create a content compliance rule that targets all internal messages that are sent from the payroll department. Modify the message by prepending a custom subject line to all payroll emails so that employees know not to delete them.
D. Create an activity rule by using Gmail log events with two conditions: one for the event of an email deletion and another that matches the header address to the payroll department’s email. Create an action that restores messages. Set the rule to run every hour.

A

D. Create an activity rule by using Gmail log events with two conditions: one for the event of an email deletion and another that matches the header address to the payroll department’s email. Create an action that restores messages. Set the rule to run every hour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your organization is migrating to Google Workspace and wants to improve how newly created files are classified. You must find a scalable solution to improve security and transparency on how to handle sensitive files. What should you do?
A. Set data loss prevention (DLP) policies to label data automatically, disable label locking, and educate users.
B. Create classification labels, enable automatic classification, and educate users.
C. Migrate data to Google Workspace, map classifications, and migrate with the Drive Labels API.
D. Integrate with the Cloud DLP API, map identifiers and classifications, install the Google Drive label client, and run the application.

A

B. Create classification labels, enable automatic classification, and educate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have enrolled a new Google Meet hardware device for an existing conference room in your building. Your users report that the new hardware in the conference does not show the expected calendar events. You need to investigate and fix the problem. What should you do?
A. Make sure that the conference room resource calendar has been created and that the Meet Hardware is associated with that resource.
B. Create a brand new resource calendar and associate the Meet Hardware with that new resource.
C. Use the Meet Quality Tool in the control panel to search for the newly installed Meet Hardware.
D. Make sure the Access permissions for the resource calendar is set to “See all event details”.

A

A. Make sure that the conference room resource calendar has been created and that the Meet Hardware is associated with that resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Users at your organization are reporting issues with Google Voice including disconnected calls and overall connection issues. You want to identify whether these issues affect just your organization or whether it’s a global Google issue. What should you do?
A. Use the Security Investigation Tool with Voice Log Events as the data source field. In the search operator fields, select Event, is, and Network Statistics (client). Analyze the packet loss.
B. Verify if there is a service outage for Google Voice reported on the Google Workspace Status Dashboard.
C. Use the Security Investigation Tool with User Log Events as the data source field. In the search operator fields, select Event, is, and Call failed. Analyze the packet loss.
D. Verify if there is a service interruption for Google Voice reported on the Google Workspace Updates Blog website.

A

B. Verify if there is a service outage for Google Voice reported on the Google Workspace Status Dashboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You work for an organization that is headquartered in Washington DC. You want to reliably send email announcements to all employees in the area and update membership automatically. What should you do?
A. Create a Dynamic Group by using the location condition to keep the distribution list automatically updated based on the employees’ work locations.
B. Create a Security Group and apply the Location label to allow employees to join based on the specified location.
C. Create a Google Group and add all employees in the Washington DC work location.
D. Create a Google Group and set permissions to invite employees to join the group.

A

A. Create a Dynamic Group by using the location condition to keep the distribution list automatically updated based on the employees’ work locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your organization has a data loss prevention (DLP) rule to detect and warn users about external sharing of sensitive files in Google Drive. You also want to prevent external users from downloading files with viewer permissions to their local machines. What should you do?
A. Do nothing. View-only Drive files automatically prevent the user from downloading the files.
B. Modify the existing DLP rule to Disable download, print, and copy for commenters and viewers.
C. Create a new DLP rule by using the existing content detector conditions, but change the action for the new rule to Disable download, print, and copy for commenters and viewers.
D. Create a new DLP rule and set the scope to the organizational unit or group that you want to restrict.

A

C. Create a new DLP rule by using the existing content detector conditions, but change the action for the new rule to Disable download, print, and copy for commenters and viewers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Recently, your organization has had an increase in messages marked as spam. You need to quickly and efficiently obtain detailed information regarding each message. What should you do?
A. Create an investigation by using a SQL query to search for all spam audit logs exported to BigQuery.
B. Send an alert to all users to mark all suspicious Gmail messages as spam and review the Alert center messages.
C. Use Google Vault to put all messages marked as spam in a legal hold and review the messages.
D. Use the spam filter report in the security dashboard to see messages Google’s spam filter marked as spam during a specific time period.

A

D. Use the spam filter report in the security dashboard to see messages Google’s spam filter marked as spam during a specific time period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are configuring a customer relationship management (CRM) solution to integrate with Google Workspace services for the sales department at your organization. The CRM solution is in the Google Workspace Marketplace and you deploy the specific CRM solution. Employees report that there are no contacts and documents visible in the CRM solution. You must identify and fix the problem. What should you do?
A. Check the OAuth scopes, and ensure that Drive and Gmail scopes are granted for the CRM solution.
B. Check if Manage access to apps is set to Allow users to install and run any app from the Marketplace.
C. Revoke all OAuth scopes, and reinstall the CRM solution for just the sales department.
D. Check if the App distribution settings are set to ON for everyone in your organization.

A

A. Check the OAuth scopes, and ensure that Drive and Gmail scopes are granted for the CRM solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your global marketing team has over 500 employees. They recently started working with Google Analytics and want to move to managed accounts. You decide to use Google Cloud Directory Sync (GCDS) to sync users from your current identity provider. Your organization currently has no Google Workspace licenses linked to the Admin console. You run GCDS for the first time and receive the following error, “Domain user limit reached.” You need to identify and fix the problem. What should you do?
A. Ensure that there is a subscription available and enough licenses to sync the new users.
B. Check if GCDS has the correct permissions to run a sync on your domain.
C. Wait 48 hours until the domain is fully provisioned.
D. Update the delete limits of GCDS, and try again.

A

A. Ensure that there is a subscription available and enough licenses to sync the new users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Your organization was recently targeted by a phishing attempt that affected several users. You must efficiently determine the full extent of the phishing attempt and prevent further issues from occurring. What should you do?
A. 1. Search BigQuery logs for all messages marked as phishing.
2. Require Transport Layer Security (TLS) for all email communications.
3. Instruct all users to reset their passwords.
B. 1. Use email log search to pull all emails for the past three days.
2. Analyze logs of common emails received and contact users.
3. Instruct users on how to create a Gmail filter to block malicious email addresses.
C. 1. Use the security dashboard to view the number of messages showing evidence of potential spoofing, and then use the investigation tool on affected users to remove malicious email.
2. Enable advanced phishing and malware protection.
3. Deploy Google’s Password Alert extension for Chrome.
D. 1. Collect phishing samples forwarded from users.
2. Add IP addresses and email addresses to your denylist.
3. Enroll only affected users to multi-factor authentication (MFA).

A

C. 1. Use the security dashboard to view the number of messages showing evidence of potential spoofing, and then use the investigation tool on affected users to remove malicious email.
2. Enable advanced phishing and malware protection.
3. Deploy Google’s Password Alert extension for Chrome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Google Analytics service is set to OFF for your entire organization. All users in the marketing team OU and a subset of users in the sales OU need access to Analytics. The rest of the organization should not have access. You must configure access in Additional Google services. What should you do?
A. Enable Google Analytics at the top of the OU structure.
B. Enable Google Analytics for the marketing and sales OUs. Create a group to deny access to Google Analytics and assign it to the sales users who should not have access.
C. Enable Google Analytics for the marketing OU. Create a sub-OU for the sales users under the marketing OU.
D. Enable Google Analytics for the marketing OU. Create a group from the Admin console that includes the sales users, and set Google Analytics to On for that group.

A

D. Enable Google Analytics for the marketing OU. Create a group from the Admin console that includes the sales users, and set Google Analytics to On for that group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your organization is engaging with an external marketing vendor on a new promotion. The vendor’s employees need access to internal documents. Some employees do not have Google consumer or Workspace accounts. You need to securely enable sharing with these external collaborators. What should you do?
A. Enable external sharing for the specific child organizational units or configuration groups.
B. Enable visitor sharing for the Google Workspace domain.
C. Create a trust rule for a shared drive to allow sharing with the external vendor.
D. Add the external domain of the vendor to the allowlist.

A

B. Enable visitor sharing for the Google Workspace domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your team uses Google Drive for collaborating with external companies and partners. A sensitive project with an external organization is about to begin. You are creating the new labels for the project. You must ensure that all labeled documents have the label visible to everyone who has access to the project files. What should you do?
A. Create Drive labels and a separate Shared Drive for the project.
B. Create Drive labels and add the users from the external organization to your domain.
C. Create Drive labels and add the permissions for all users in the project, including the external users, to view these labels.
D. Create Drive labels and apply data protection rules to all project file.

A

C. Create Drive labels and add the permissions for all users in the project, including the external users, to view these labels.

22
Q

You work for an international organization and your CEO frequently travels to other countries. You need to enable email access and configure the account for multiple administrative assistants. What should you do?
A. Provide the executive administrative assistants with the account password of the CEO.
B. Enable users to specify what sender information is included in delegated messages sent from their account.
C. Create a group of administrative assistants. Enable delegated access to the mailbox of the CEO for that group.
D. Log into the Gmail account of the CEO. Set up and share two separate email aliases.

A

C. Create a group of administrative assistants. Enable delegated access to the mailbox of the CEO for that group.

23
Q

You work at a financial institution with strict security requirements. You have been asked by the head of IT security to enforce the policy that allows access to Google Workspace services only from devices that are within the company’s network. What should you do?
A. Ask everyone to use Chromebooks in your organization and deploy network certificates.
B. Enable context-aware access (CAA) for all employees, and add the location as a context condition.
C. Enable context-aware access (CAA) for all employees, and add the IP subnet as a context condition.
D. Enable client-side encryption (CSE) for all employees.

A

C. Enable context-aware access (CAA) for all employees, and add the IP subnet as a context condition.

24
Q

You work for a small organization and are planning to deploy an upcoming Google Workspace feature. You want users to have access to the feature as soon as possible. What should you do?
A. Confirm that your organization is set to the rapid release option to ensure that your users receive new features when Google releases them.
B. Do nothing. No extra configuration is needed as all Workspace customers receive new features at the same time.
C. Confirm that your organization is set to the scheduled release option to ensure that your users receive new features when Google releases them.
D. Enable the new feature in a Workspace Sandbox organization, and roll out to users only after testing.

A

A. Confirm that your organization is set to the rapid release option to ensure that your users receive new features when Google releases them.

25
An administrator accidentally deleted several Workspace user accounts from the Google Admin Console two weeks ago. How can you recover the deleted user accounts? A. Open a Google support ticket, and request a recovery of all recently deleted users. B. Sign in to the Admin console as Help Desk Admin, open user management, filter for "recently deleted," and recover. C. Sign in to the Admin console as Super Admin, open user management, filter for "recently deleted, and recover. D. Create a matter, go to legal hold, and create a legal hold for the user accounts.
C. Sign in to the Admin console as Super Admin, open user management, filter for "recently deleted, and recover.
26
A team of field technicians at your organization has been misusing their corporate email account. You need to enforce the corporate policy that prohibits the field technicians from sending emails externally. What should you do? A. Place the field technicians in a separate organizational unit (OU) and disable the Gmail mobile app. B. Disable automatic forwarding for all field technicians. C. Place the Field Technicians in a Group. Create and apply a domain wide 'Reject message' rule to the entire group. D. Create a routing rule by using the Reject message option for the organization's domain, and apply the rule to the field technician organizational unit (OU).
D. Create a routing rule by using the Reject message option for the organization's domain, and apply the rule to the field technician organizational unit (OU).
27
Your organization has hired a recruiting firm that is responsible for reviewing resumes and job descriptions of prospective summer interns. Employees at your organization need to collaborate with the external firm on these documents. You must set permissions and ensure the recruiting firm employees can't remove the files. What should you do? A. Create a Google Group, add the HR team, and create a shared folder for content storage and editing. B. Create a Shared Drive and grant Contributor access to the HR team. C. Enable client-side encryption for the organizational unit (OU) for which the HR team are members. D. Create a Shared Drive and grant Content Manager access to the HR team.
B. Create a Shared Drive and grant Contributor access to the HR team.
28
An employee in your organization is reporting that they cannot access a non-Google file in the Google Drive web interface even though other documents in Google Drive are working. You want to identify why they can't access the file and fix the problem. What should you do? (Choose two.) A. Instruct the employee to make a copy of the document by using the Google Drive user Interface, then work from the copy. B. Reset the sign-in cookies of the employee. C. Instruct the employee to check the size of the document and divide the information into smaller parts if it is close to the limit. D. Disable Context-Aware Access policies. E. Instruct the employee to clear the browser cache.
C. Instruct the employee to check the size of the document and divide the information into smaller parts if it is close to the limit. E. Instruct the employee to clear the browser cache.
29
Your organization wants to improve security and will restrict employees from accessing corporate documents while traveling internationally. Employees are still allowed to send and receive emails. You are setting up context-aware access levels and need to configure Workspace to support these security policies. What should you do? A. Set up access levels by using geographic origin of where the users are accessing Workspace services as the parameter. Assign this access level to Gmail. B. Set up access levels by using the users' device operating system as the parameter. Assign this access level to Gmail. C. Set up access levels by using the users' device operating system as the parameter. Assign this access level to Google Drive. D. Set up access levels by using the geographic origin of where the users are accessing Workspace services as the parameter. Assign this access level to Google Drive.
D. Set up access levels by using the geographic origin of where the users are accessing Workspace services as the parameter. Assign this access level to Google Drive.
30
An employee at your organization created a recurring calendar event. When they made edits to the recurring event, none of the event attendees received email notifications with the changes. You collected the Google Calendar IDs and user emails. You must troubleshoot the issue and collect additional information from the event attendees before contacting the Google Support team. What should you do? A. Capture the Gmail labels used by the reported user. B. Capture the number of times the Event is set for recurrence to ensure that the host is not hitting the email limits. C. Capture the relevant Event IDs and the ICS files by using the Show original option. D. Capture the laptop OS version of the user to troubleshoot if there are older versions of the event being displayed.
C. Capture the relevant Event IDs and the ICS files by using the Show original option.
31
An employee at your company does not need access to their Workspace account while they are on leave for a year. When they return, you need to ensure they have access to their account and that all their data and current emails remain intact. Also, their shared documents must be available to other users. You must accomplish this goal in the most cost-effective way. What should you do? A. Assign an Archive User license. B. Suspend their account in the Admin console. C. Delete the user after copying their emails and reassigning their documents to their manager. D. Remove the user license in the Admin console.
A. Assign an Archive User license.
32
You have implemented a data loss prevention (DLP) policy for a specific finance organizational unit. You want to apply the same security policy to a shared drive owned by the finance department in the most efficient manner. What should you do? A. In the Admin console sharing settings, select the finance organizational unit and deselect Allow users outside the domain to access files in shared drives. B. Assign the Shared Drive to the finance organizational unit. C. Create a new DLP policy for shared drive users. D. Change the scope of the policy to apply to all in the domain.
B. Assign the Shared Drive to the finance organizational unit.
33
By using Account Activity reports, you have flagged several users who are uploading large files. You want to ensure you don't run out of pooled storage and you want to stop the abuse. What should you do first? A. Email flagged users with a warning of possible abuse. B. Use the Security Investigation Tool to set alerts on the flagged users. C. Warn the flagged users, and purchase more pooled storage to avoid hitting storage quotas. D. Place the flagged users in a configuration group and set storage limits for the group.
D. Place the flagged users in a configuration group and set storage limits for the group.
34
Your organization has a strict requirement that your temporary employees can only send emails to and receive emails from specific external domains. You must define a policy in Google Workspace that meets this requirement for users in the temporary employee organizational unit (OU). What should you do? A. Create a policy in Gmail settings that rewrites the recipient for outbound messages and quarantines incoming messages to review before delivery. B. Add the allowed domains when configuring the restrict delivery setting in Gmail settings, and select the box to bypass for internal emails. C. Restrict sending and receiving to Google Groups, and carefully curate the temporary employees' memberships. D. Configure the restrict delivery setting to limit domains that the temporary employees can communicate with. Allow Google Docs sharing notifications.
D. Configure the restrict delivery setting to limit domains that the temporary employees can communicate with. Allow Google Docs sharing notifications.
35
Your organization is working on a confidential project with details that cannot be shared through email with anyone outside your organization. You want to add controls in Gmail that prevent any mention of the project from being sent by employees. Only the CEO and the CFO can send information about the project over email and without a delay. What should you do? A. Configure the Gmail Restrict delivery setting, and add an allowlist with all domains that your employees are allowed to send emails to. Include the CEO and CFO email addresses to the allowlist. B. Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project. Bypass the rule by using the address list with the CEO and CFO email addresses. C. Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project. Manually review all quarantined emails and choose to deliver the ones sent by the CEO and CFO. D. Configure the Gmail Restrict delivery setting for all outgoing messages, except the internal emails. Add the CEO and CFO email addresses to the allowlist.
B. Configure a Gmail Content compliance rule for outbound email that quarantines all email mentioning the project. Bypass the rule by using the address list with the CEO and CFO email addresses.
36
Before leaving your organization, an employee in the finance department created and shared documents from My Drive. Their manager wants to keep all the files, but only some of these documents need to be available in the Shared Drive of the finance department. You need to quickly and efficiently delete the Workspace account for the former employee but also ensure that the finance department can access the required files. What should you do? A. Before leaving the organization, instruct the employee to create a folder in My Drive, move the documents that need to be shared, then share that folder with the Finance manager and delete the user. B. Use Google Takeout to download the Drive data and then upload the data back to the Shared Drive of the finance department. C. Use Google Vault to set a retention policy for the organizational unit (OU) where the former employee resides. D. In the User Deletion process, transfer ownership of the documents to the manager. After completion, instruct the manager to move the desired documents into the Shared Drive of the finance department.
D. In the User Deletion process, transfer ownership of the documents to the manager. After completion, instruct the manager to move the desired documents into the Shared Drive of the finance department.
37
Your team wants to schedule meetings based on your availability. You need to securely and efficiently share your calendar with your team. What should you do? A. Share your calendar with your team. Set the sharing permissions for the calendar to show free/busy details. B. Create a new group calendar and share it with your team members. Set the sharing permissions for the calendar to show free/busy details. C. Make your calendar public and set the permissions for events to show free/busy details. D. Export your calendar and then have your team import it into their Calendar environment.
A. Share your calendar with your team. Set the sharing permissions for the calendar to show free/busy details.
38
You work for a midsize organization. Your compliance and audit team sees that users are frequently resetting their passwords. You must provide accurate information and ensure that the compliance team is informed every time a user changes their password. What should you do? A. Create a new alert by using user log events and check that event Login type is Google password, and include the compliance team in the email notifications. B. Check the User's password changed alert in the alert center and include the compliance team in the email notifications. C. Disable user account recovery so users must contact you before a reset. D. Enable user account recovery and forward any alert to the compliance team through the alert center.
B. Check the User's password changed alert in the alert center and include the compliance team in the email notifications.
39
You need to offboard a full team of users at your organization. The organizational policy requires that all data and comments must be retained and available for eDiscovery for at least two years. Google Vault has already been configured. You must determine the most cost effective and flexible approach. What should you do? A. Purchase archived user licenses and suspend the users. B. Purchase archived user licenses and archive the users. Most Vated C. Move the users to their own organizational unit (OU) and disable access to Google services. D. Remove the Google Workspace license and transfer files and data
B. Purchase archived user licenses and archive the users. Most Vated
40
An employee at your organization had very poor quality during a Google Meet video call from their laptop. They were at a coffee shop and not on the corporate network during the meeting. You must troubleshoot the issue quickly and efficiently. What should you do first? A. Check to see if there was a Google Meet outage at the time of the meeting by using the Google Workspace Status Dashboard. B. Check the user's participant statistics by using the Meet quality tool and entering the corresponding meeting code. C. Check to see if Context-Aware access rules were set to prevent Meet access from the user's network location. D. Search for the Meet log events during the time of the Meeting by using the security investigation tool.
B. Check the user's participant statistics by using the Meet quality tool and entering the corresponding meeting code.
41
Your company maintains a strict privacy policy regarding the external sharing of certain information. You need to scan and block any outgoing email that contains certain sensitive data, such as credit card and national ID numbers. What should you do? A. Create a content compliance rule that blocks any outbound email that contains sensitive data. B. Create a Drive Data Loss Prevention (DLP) rule that blocks content with sensitive data. C. Create a new Activity rule that sends a High severity alert for any outbound email that contains sensitive data. D. Create a content compliance rule that warns the user when they're sending any outbound email that contains sensitive data but still allows sending with proper justification.
A. Create a content compliance rule that blocks any outbound email that contains sensitive data.
42
Your organizational policies require that all documents containing personally identifiable information (PII) are labeled as "Sensitive". You want to scan all files in your corporate Drive and apply the label to all files containing PII. What should you do? A. Create a data protection rule for Drive that automatically applies the label named "Sensitive" to Drive files with PII. B. Create a data protection rule for Drive that automatically applies a label named "Sensitive" to new Drive files with Pll. and requires users to add a label to previously created files with Pil. C. Enable data classification for your corporate Drive. Create a label named "Sensitive" that is automatically applied to all new and previously created files in your domain. D. Enable data classification for your corporate Drive. Create a label named "Sensitive" that is automatically applied to all new files in your domain.
A. Create a data protection rule for Drive that automatically applies the label named "Sensitive" to Drive files with PII.
43
Your organization's legal department needs to provide access to Google Vault exports for one team member. This team member should be able to view, download, and delete Google Vault exports across the organization. However, this user should be prohibited from creating exports. You must create, assign, and configure a custom role for this user. What should you do? A. Add the Manage Exports privilege for the user at the top of the organizational unit structure. B. Add the Manage Holds and Manage Exports privileges for the user's organizational unit. C. Add the Manage Exports privilege for the user's organizational unit. D. Add the Manage Exports and Manage Searches privileges for the user at the top of the organizational unit structure.
A. Add the Manage Exports privilege for the user at the top of the organizational unit structure.
44
Samantha, an employee from your engineering department, has submitted a help desk ticket. She is unable to share a Google Doc file with Jason, her coworker in the marketing department. However, Samantha is able to share the same file with her colleagues in the engineering department. You must troubleshoot the issue. What should you do? A. Confirm if a trust rule is preventing sharing with Jason or someone that belongs to the marketing department. B. Verify that Samantha's Drive sharing settings in the Admin console allow sharing content outside her organization. C. Confirm if there is a data protection rule that is preventing the sharing of this particular Google Doc. D. Instruct Samantha to export a PDF copy of the document and email it to Jason.
A. Confirm if a trust rule is preventing sharing with Jason or someone that belongs to the marketing department.
45
Two months ago, your organization's board set an ambitious goal to publish a data driven report on the environmental impact of their IT operations. You must provide the data for the board report. Which report should you share? A. Monthly update reports B. Carbon footprint report. C. Work insights report D. Costs report
B. Carbon footprint report.
46
An employee at your organization is resigning. They are in charge of organizing and maintaining recurring team events. You want to preserve the existing meetings and transfer ownership to the resigning employee's manager. What should you do? A. Transfer both the events and the resources owned by the resigning employee to their manager by using the Admin console. B. Delete the existing calendar events and instruct the manager to create new events as the owner. C. Assign an Archived User (AU) license for the resigning employee. D. Instruct the resigning employee to share free/busy details for their calendar with their manager.
A. Transfer both the events and the resources owned by the resigning employee to their manager by using the Admin console.
47
Your organization has migrated to Google Workspace and has several different tenants from different businesses they have acquired. The IT team is considering whether to consolidate all of their tenants under a single Google Workspace tenant or allow certain domains to have an additional tenant for separation. What approach should you suggest and why? A. Single tenant, because it simplifies administration and centralizes policy control. B. Single tenant, because each business will have a super administrator account to separate responsibilities. C. Multitenant, because each business prefers to manage itself. D. Multitenant, because it simplifies user creation and collaboration across domains.
A. Single tenant, because it simplifies administration and centralizes policy control.
48
An employee at your organization is going on long-term leave for an unknown period of time. Their teammate is working on a shared project and needs access to all the project files owned by the employee on leave. You must grant access to all these files efficiently. What should you do? A. Suspend the Workspace account of the employee who is on leave. B. Grant the teammate access to the project files by using the transfer ownership functionality. C. Locate the folder that contains the project files by using the security investigation tool. Make a copy of the files for the teammate. D. Locate, download, and share the project files with the teammate.
B. Grant the teammate access to the project files by using the transfer ownership functionality.
49
Your organization's legal team is conducting a legal review of an employee. The default retention period for your organization is indefinite. You must assist your legal team with retrieving the employee's emails for a one month period. What should you do? A. Create a new Matter inside Google Vault. Specify Gmail, the user, and the timeframe to retrieve messages. B. Restore the user's deleted Gmail messages from the Admin console and export the user's inbox messages by using an API. C. Specify the time frame and user by using Google Vault's audit reports. Export the report as a CSV file. D. Create a new retention rule inside Google Vault. Specify Gmail and the timeframe to retain messages.
A. Create a new Matter inside Google Vault. Specify Gmail, the user, and the timeframe to retrieve messages.
50
An employee at your organization is unable to send and receive emails by using their mobile device. You must identify the next step to troubleshoot and fix the issue as quickly as possible. What should you do? A. Collect more information about the employee's device, mail client, and error message. B. Instruct the employee to generate an HTTP Archive (HAR) file recording to start troubleshooting. C. Tell the employee to reinstall the Gmail application on their phone. D. Contact Google Workspace support for immediate assistance.
A. Collect more information about the employee's device, mail client, and error message.