Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Google-Workspace-Administrator Questions and Answers

Question # 6

A new user at your organization is unable to access Google Meet. You have verified that the user’s account is active and the correct licenses are assigned. You need to resolve the access issue. What should you do?

A.

Check the user’s browser settings to ensure that Meet is not blocked.

B.

Instruct the user to clear their browser’s cache and cookies.

C.

Restart the user’s computer to refresh their network connection.

D.

Verify that Meet is enabled as a service for the user’s account in the Admin console.

Full Access
Question # 7

Your organization wants to provide access to YouTube to a select group of users for educational purposes, while restricting YouTube access for all other users. You need to implement a solution that allows for granular control over YouTube access based on user roles or groups. What should you do?

A.

Deploy a Chrome extension from the Google Workspace Marketplace that blocks YouTube for users who are not in the select user group.

B.

Configure a SAML application to manage YouTube access for different user groups.

C.

Instruct the select group of users to switch to their personal Google account when accessing YouTube.

D.

Use organizational units (OUs) to apply a policy that restricts YouTube access, and create an exception for the select group of users.  

Full Access
Question # 8

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee’s documents for the manager and the team.

You want to minimize license cost. What should you do?

A.

Delete the former employee's Workspace account.

B.

Suspend former employee's Workspace account.

C.

Reset the password of the former employee and keep their Workspace license active.

D.

Switch the license type of the former employee's Workspace account to an Archived User license.

Full Access
Question # 9

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company’s security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

A.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

B.

Assign the User Management Admin role to the security team.

C.

Assign the super admin role to the security team

D.

Create an administrator role with Security Center access. Assign the role to the security team.

Full Access
Question # 10

You are configuring email for your company’s Google Workspace account. The company wants to prevent certain types of files from being sent or received as email attachments in the simplest and most cost-effective way. What should you do?

A.

Adjust the maximum message size limit to prevent large files from being sent or received.

B.

Enable the Security Sandbox in Gmail to automatically quarantine emails with suspicious attachments.

C.

Scan all incoming and outgoing emails for malicious attachments by using an industry standard third-party email security solution.

D.

Configure an attachment compliance rule in Gmail settings to block specific file types.

Full Access
Question # 11

The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?

A.

Instruct the IT department to directly access and forward the relevant emails to the legal department.

B.

Temporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.

C.

Ask a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.

D.

Use Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.

Full Access
Question # 12

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Full Access
Question # 13

An employee at your organization may be sharing confidential documents with unauthorized external parties. You must quickly determine if any sensitive information has been leaked. What should you do?

A.

Review the employee's Drive log events in the security investigation tool.

B.

Audit Drive access by using the Admin SDK Reports API.

C.

Review the employee's user log events within the security investigation tool.

D.

Create a custom report of the user's external sharing by using the security dashboard.

Full Access
Question # 14

Your company has just started using Search Ads 360. You need to limit access to Additional Google services for your entire organization by using the Admin console. Only the marketing team and a specific group of users from the web design team should have access. What should you do?

A.

Enable Search Ads 360 for both the marketing and web design team organizational units (OUs). Create a group to explicitly deny access to Search Ads 360. Assign the group to the web design users who should not have access.

B.

Enable Search Ads 360 at the top level of your organizational structure.

C.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a sub-OU under the marketing OU. and move the web design team users who need access into this sub-OU.

D.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a new group in the Admin console that includes the web design team users who need access. Enable Search Ads 360 for that group.

Full Access
Question # 15

Your company provides shared Chromebook workstations for employees to access sensitive company data. You must configure the devices to ensure no sensitive data is stored locally and that browsing data is cleared after each use. What should you do?

A.

Force ephemeral mode in Chrome. Disable offline access for sensitive Workspace apps like Docs, Sheets, and Drive.

B.

Enable the Manage Guest Session functionality, and set the maximum user session length.

C.

Force ephemeral mode in Chrome. Allow offline access for all Workspace apps with strict expiration times.

D.

Disable offline access for all Workspace apps. Enable incognito mode for Chrome browsing sessions.

Full Access
Question # 16

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Full Access
Question # 17

Your company has offices in several different countries and is deploying Google Workspace. You're setting up Google Calendar and need to ensure that, when a user is creating a Google Calendar event, rooms are suggested in a nearby office. What should you do?

A.

Assign building ID, floor name, and floor section to define users' work locations based on defined buildings and rooms.

B.

Add your users to Google Groups by location. Add room resources to the corresponding groups.

C.

Add your users to organizational units (OUs) by location. Add room resources to the corresponding OUs.

D.

Restrict room sharing to a dynamic group based on user location.

Full Access
Question # 18

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Full Access
Question # 19

Your company has recently migrated from an on-premises email solution to Google Workspace. You have successfully added and verified the new primary domain. However, you also want to continue receiving emails sent to your former on-premises email server for a transitional period. You need to ensure that emails sent to your former domain are still delivered to your on-premises server, even though your primary email system is now Google Workspace. What should you do?

A.

Configure MX records for the former domain to point to your on-premises email servers.

B.

Add the former domain as a secondary domain in your Google Workspace settings and verify the domain.

C.

Adjust the TTL (Time-to-Live) for the former domain to ensure a smooth transition.

D.

Add the former domain as a domain alias for the primary domain.

Full Access
Question # 20

Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?

A.

Configure the Drive sharing options for the domain to internal only.

B.

Restrict the Drive sharing options for the domain to allowlisted domains.

C.

Create a Drive DLP rule, and use the sensitive internal Project name as the detector.

D.

Turn off the Drive sharing setting from the Team dashboard.

Full Access
Question # 21

An employee with a Workspace Business Plus license at your company is going on a long leave soon. The employee will not need access to their Google Workspace data, but their teammates will need access to the employee’s data. When the employee returns from leave, you will need to restore access to theiraccount, data, emails, and shared documents. You need to preserve the employee’s Workspace data while also minimizing cost while they are on leave. What should you do?

A.

Suspend their account in the Admin console.

B.

Purchase an Archived User license and assign the license to the employee.

C.

Export the account data by using Takeout, and remove the user license in the Admin console.

D.

Copy the employee’s emails, and transfer their file ownership to a teammate. Delete the user account.

Full Access
Question # 22

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Full Access
Question # 23

A user is experiencing intermittent issues accessing their Gmail inbox. Sometimes their Gmail loads slowly, and other times the user encounters error messages that haven’t been documented. You need to effectively troubleshoot this recurring problem. What should you do?

A.

Check the Google Workspace Status Dashboard for any reported service disruptions.

B.

Instruct the user to generate a HAR file the next time they experience slowness or an error.

C.

Instruct the user to try to access Gmail from another device or network to see if the issue persists.

D.

Instruct the user to clear their browser cache and cookies.

Full Access
Question # 24

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

A.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

B.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

C.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

D.

Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Full Access
Question # 25

Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentiallyleading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?

A.

Add a banner to the newsletter that warns users that external sharing is prohibited.

B.

Create a Gmail content compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected

C.

Develop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.

D.

Create a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.

Full Access
Question # 26

Your organization allows employees to use their personal mobile devices to check their work emails. You need to remove the employee’s work email data from their phone when they leave the organization. What should you do?

A.

Set up basic mobile management on the devices.

B.

Set up advanced mobile management on the devices.

C.

Set up data protection rules to prevent data sharing externally.

D.

Set up 2SV authentication on the devices.

Full Access
Question # 27

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

A.

Conduct a Vault search to find this email and identify if additional users were affected.

B.

Conduct a search to find all emails sent by the sender by using the Gmail API.

C.

Conduct an Email reports search to find this email and all of the email's recipients.

D.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Full Access