Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Google-Workspace-Administrator Questions and Answers

Question # 6

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Full Access
Question # 7

Your organization needs an approval application for purchases where a user can enter information on the purchase required and then submit it for management approval. You need to suggest a solution to create the application that must be available on both the web and mobile devices. Your organization does not have software developers or the budget to hire a third party. What should you do?

A.

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

B.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

C.

Suggest the organization use AppSheet to create the application.

D.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

Full Access
Question # 8

You are configuring email for your company’s Google Workspace account. The company wants to prevent certain types of files from being sent or received as email attachments in the simplest and most cost-effective way. What should you do?

A.

Adjust the maximum message size limit to prevent large files from being sent or received.

B.

Enable the Security Sandbox in Gmail to automatically quarantine emails with suspicious attachments.

C.

Scan all incoming and outgoing emails for malicious attachments by using an industry standard third-party email security solution.

D.

Configure an attachment compliance rule in Gmail settings to block specific file types.

Full Access
Question # 9

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee’s documents for the manager and the team.

You want to minimize license cost. What should you do?

A.

Delete the former employee's Workspace account.

B.

Suspend former employee's Workspace account.

C.

Reset the password of the former employee and keep their Workspace license active.

D.

Switch the license type of the former employee's Workspace account to an Archived User license.

Full Access
Question # 10

A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?

A.

Purchase and assign Archived User licenses to the former employees.

B.

Transfer the former employees' files and data to active user accounts. Delete the former employees' Workspace accounts.

C.

Purchase additional user licenses and suspend the former employees' accounts.

D.

Move the former employees to their own organizational unit(OU) and disable access to Google services for that OU.

Full Access
Question # 11

You are configuring Google Chat for your organization. Using the Adin console, you want to enable employees to view their chat history by default and allow employees to turn off chat history. What should you do?

A.

Configure Google Vault to retain all Chat messages, and exclude organizational units (OUs) with users who want to turn Chat history off.

B.

Set the space history setting to OFF and chat history to ON.

C.

Set the top-level default conversation history setting to ON and allow users to change their history setting.

D.

Set the top-level default conversation history settings to OFF and allow users in each organizational unit (OU) to change their history setting.

Full Access
Question # 12

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Full Access
Question # 13

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

A.

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.

Enable Protect against unauthenticated emails in Gmail Safety.

D.

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Full Access
Question # 14

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

A.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

B.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

C.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

D.

Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Full Access
Question # 15

You need to ensure that data owned by former employees remains available in Google Vault. You want to use the most cost-effective solution.

What should you do?

A.

Migrate the former employees’ Gmail to their manager(s) by using the data migration service during the deletion process. Transfer the former employees’ Google Drive files to a new owner.

B.

Change the Google account passwords of the former employees.

C.

Suspend the former employees’ Google accounts. Create an organizational unit (OU). Move the former employees into that OU.

D.

Assign an Archived User license to the former employees’ Google accounts.

Full Access
Question # 16

Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentiallyleading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?

A.

Add a banner to the newsletter that warns users that external sharing is prohibited.

B.

Create a Gmailcontent compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected

C.

Develop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.

D.

Create a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.

Full Access
Question # 17

An employee is leaving your company and has numerous files stored in My Drive. Their manager wants to retain access to these files. You need to offboard the departing employee’s Google Workspace account while ensuring that the manager can still access the files while following Google-recommended practices. What should you do?

A.

Use Google Vault to establish a retention policy for the organizational unit (OU) of the departing employee. Assign the Google Archived User license.

B.

Instruct the departing employee to share their My Drive folder with the manager before leaving. Delete the Google Workspace account on the departing employee’s last day.

C.

Download the departing employee’s Drive data by using Google Takeout. Upload the data to the manager’s Drive before deleting the departing employee’s Google Workspace account.

D.

Transfer ownership of the departing employee’s files to the manager during the user deletion process.

Full Access
Question # 18

An end user has thousands of files stored in Google Drive. Their files are well organized with Drive labels. You need to advise the end user on how to quickly identify all files that are contracts. What should you do?

A.

Advise the user to use the Google Drive API to search for files with the keyword "contracts'

B.

Advise the user to search in Drive for files with the keyword "contracts', and use the "modified by me' filter.

C.

Advise the user to search for files that are labeled as "contracts'.

D.

Advise the user to use the Investigation tool to search for files with the keyword "contracts' and updated by you.

Full Access
Question # 19

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

A.

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.

B.

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.

C.

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.

D.

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.

Full Access
Question # 20

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Full Access
Question # 21

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Full Access