Deck 17: Professional Collaboration Engineer

Full screen (f)
exit full mode
Question
A user does not follow their usual sign-in pattern and signs in from an unusual location. What type of alert is triggered by this event?

A) Suspicious mobile activity alert.
B) Suspicious login activity alert.
C) Leaked password alert.
D) User sign-in alert.
Use Space or
up arrow
down arrow
to flip the card.
Question
The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue. What two actions should you take? (Choose two.)

A) Obtain the message header and analyze using G Suite Toolbox.
B) Review the contents of the messages in Google Vault.
C) Set up a Gmail routing rule to whitelist the sender.
D) Conduct an Email log search to trace the message route.
E) Validate that your domain is not on the Spamhaus blacklist.
Question
You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly. What should you do?

A) Use the bulk upload with CSV feature in the G Suite Admin panel to update all Groups.
B) Update your configuration file and resync mailing lists with Google Cloud Directory Sync.
C) Create and assign a custom admin role for all group owners so they can update settings.
D) Use the Groups Settings API to update Google Groups with desired settings.
Question
In the years prior to your organization moving to G Suite, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on G Suite.) You were able to address active employees' use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account. What should you do?

A) Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-G Suite Google services and have them blocked.
B) Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
C) Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
D) Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all G Suite and Other Google Services disabled.
Question
A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network. Where should you enable this in the Chrome management settings?

A) Randomly scatter auto-updates.
B) Update over cellular.
C) Disable Auto update.
D) Throttle the bandwidth.
Question
Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information. What should you do?

A) Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
B) Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
C) Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
D) Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Question
Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app. What should you do?

A) For the Finance OU, enable the third-party app in SAML apps.
B) For the Finance OU, enable the third-party app in Marketplace Apps.
C) At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the G Suite Marketplace.
D) At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the G Suite Marketplace.
Question
Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named G Suite accounts (e.g., user1@your-company.com, user2@your-company.com, user3@your-company.com). The manager of this program wants all email to these accounts routed to the manager's mailbox account also. What should you do?

A) Setup address forwarding in each account's GMail setting menu.
B) Set up recipient address mapping in GMail Advanced Settings.
C) Configure an Inbound Gateway route.
D) Give the manager delegated access to the mailboxes.
Question
Your company moved to G Suite last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session. How should you accomplish this?

A) In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.
B) Room participants will need to start the meeting from the remote in the room.
C) By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.
D) Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.
Question
Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes. What action should you take?

A) Company Profile > Profile > New User Features > Enable "Scheduled Release"
B) Apps > G Suite > Gmail > Uncheck "Enable Gmail Labs for my users"
C) Company Profile > Profile > New User Features > Enable "Rapid Release"
D) Device Management > Chrome > Device Settings > Stop auto-updates
Question
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator. What should you do?

A) Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
B) Change Enrollment Controls to Place Chrome device in user organization.
C) Change Enrollment Controls to Keep Chrome device in current location.
D) Change Enrolment Permissions to not allow users in this organization to enroll new devices.
Question
Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit. What should you do?

A) From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.
B) From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.
C) From the G Suite Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.
D) From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.
Question
The application development team has come to you requesting that a new, internal, domain-owned G Suite app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app. What should you do?

A) Enable all API access for Google Drive.
B) Enable "trust domain owned apps" setting.
C) Add OAuth Client ID to Google Drive Trusted List.
D) Whitelist the app in the G Suite Marketplace.
Question
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU. What should you do?

A) Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
B) Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
C) Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
D) Create an approved senders list at the Market Research OU that contains the mass email sender addresses.
Question
The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it. What should you do?

A) Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.
B) Using the Gmail Audit log, perform a search for the email, export the results, then import with G Suite Migration for Microsoft Outlook.
C) Using the Message ID, contact Google G Suite support to recover the email, then import with G Suite Migration for Microsoft Outlook.
D) Using the Vault Audit log, perform a search for the email, export the results. then import with G Suite Migration for Microsoft Outlook.
Question
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite? You want to investigate using an audit log. What log should you use?

A) Admin audit log
B) SAML audit log
C) Drive usage audit log
D) OAuth Token audit log
Question
You are supporting an investigation that is being conducted by your litigation team. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user's awareness. What two actions should you take? (Choose two.)

A) Move the user to their own Organization Unit, and set a custom retention policy
B) Create a matter using Google Vault, and share the matter with the litigation team members.
C) Create a hold on the user's mailbox in Google Vault
D) Reset the user's password, and share the new password with the litigation team.
E) Copy the user's data to a secondary account.
Question
You have configured your G Suite account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization. What should you do?

A) Create a new OU and tum on the rapid release track just for this OU.
B) Create a new Google Group with test users and enable the rapid release track.
C) Establish a separate Dev environment, and set it to rapid release.
D) Ask Google for a demo account with beta access to the new features.
Question
In your organization, users have been provisioned with either G Suite Enterprise, G Suite Business, or no license, depending on their job duties, and the cost of user licenses is paid out of each division's budget. In order to effectively manage the license disposition, team leaders require the ability to look up the type of license that is currently assigned, along with the last logon date, for their direct reports. You have been tasked with recommending a solution to the Director of IT, and have gathered the following requirements: Team leaders must be able to retrieve this data on their own (i.e., self-service). Team leaders are not permitted to have any level of administrative access to the G Suite Admin panel. Team leaders must only be able to look up data for their direct reports. The data must always be current to within 1 week. Costs must be mitigated. What approach should you recommend?

A) Export log data to BigQuery with custom scopes.
B) Use a third-party tool.
C) Use App Script and filter views within a Google Sheet.
D) Create an app using AppMaker and App Script.
Question
Your organization has been on G Suite Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the G Suite environment. The chief security officer wants that data brought into your existing SIEM system. What are two ways you should accomplish this? (Choose two.)

A) Use the Data Export Tool to export admin audit data to your existing SIEM system
B) Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
C) Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
D) Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
E) Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
Question
Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to G Suite data, the data they have access to, and the number of users who are using the applications. How should you compile the data being requested?

A) Review the authorized applications for each user via the G Suite Admin panel.
B) Create a survey via Google forms, and collect the application data from users.
C) Review the token audit log, and compile a list of all the applications and their scopes.
D) Review the API permissions installed apps list, and export the list.
Question
Your business partner requests that a new custom cloud application be set up to log in without having separate credentials. What is your business partner required to provide in order to proceed?

A) Service provider logout URL
B) Service provider ACS URL
C) Identity Provider URL
D) Service provider certificate
Question
Your CISO is concerned about third party applications becoming compromised and exposing G Suite data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?

A) Create a report using the OAuth Token Audit Activity logs.
B) Create a report using the Calendar Audit Activity logs.
C) Create a report using the Drive Audit Activity logs.
D) Create a reporting using the API Permissions logs for Installed Apps.
Question
Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward. What should you do?

A) Disable access to all "Other Services" in the G Suite Admin Console.
B) Use the Transfer Tool for unmanaged accounts to invite users into the domain.
C) Use the Data Migration Service to transfer the data to a managed account.
D) Open a support ticket to have Google transfer unmanaged accounts into your domain.
Question
The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one is in violation of the new security policy. What should you do?

A) Enable "Suspicious login" rule - Other Recipients: CTO
B) Enable "Suspended user made active" rule - Other Recipients: CTO
C) Enable "Email settings changed" rule - -Other Recipients: CTO
D) Enable "Suspended user made active" rule and select "Deliver to" Super Administrator(s)
Question
Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else. What two things should you do? (Choose two.)

A) Disable Guest Mode and Public Sessions.
B) Enable a Device Policy of Sign In Screen and add the employee email address.
C) Enroll a 2-Factor hardware key on the device using the employee email address.
D) Enable a User Policy of Multiple Sign In Access and add just the employee email address.
E) Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.
Question
Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Worspace data should be stored in a separate backup environment. How should you store data for this situation?

A) Use routing rules to dual-deliver mail to an on-premises SMTP server and Google Worspace.
B) Write a script and use Google Worspace APIs to access and download user data.
C) Use a third-party tool to configure secure backup of Google Worspace data.
D) Train users to use Google Takeout and store their archives locally.
Question
After a recent transition to G Suite, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff. What should you do?

A) Create a custom Apps Script to reset passwords.
B) Use a third-party tool for password recovery.
C) Enable non-admin password recovery.
D) Create a Google form to submit reset requests.
Question
Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration. Which scenario could require an alternative deployment strategy?

A) Some of your Active Directory groups have sensitive group membership.
B) Some of the Active Directory groups do not have owners.
C) Some of the Active Directory groups have members external to organization.
D) Some of the Active Directory groups do not have email addresses.
Question
Your organization syncs directory data from Active Directory to G Suite via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data. What two actions should you take? (Choose two.)

A) Add the user's old email address to their account in the G Suite Admin panel.
B) Change the user's primary email address in the G Suite Admin panel.
C) Change the user's last name in the G Suite Admin panel.
D) Change the user's primary email in Active Directory.
E) Change the user's last name in Active Directory.
Question
The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again. What two actions should you take? (Choose two.)

A) Configure objectionable content to reject messages with the words "wire transfer."
B) Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
C) Create a rule requiring secure transport for all messages regarding wire transfers.
D) Add the sender of the wire transfer email to the blocked senders list.
E) Enable all admin settings in Gmail's safety > spoofing and authentication.
Question
All Human Resources employees at your company are members of the "HR Department" Team Drive. The HR Director wants to enact a new policy to restrict access to the "Employee Compensation" subfolder stored on that Team Drive to a small subset of the team. What should you do?

A) Use the Drive API to modify the permissions of the Employee Compensation subfolder.
B) Use the Drive API to modify the permissions of the individual files contained within the subfolder.
C) Move the contents of the subfolder to a new Team Drive with only the relevant team members.
D) Move the subfolder to the HR Director's MyDrive and share it with the relevant team members.
Question
Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy. What should you do?

A) Access the Security Menu> API Reference > disable all API Access.
B) Access the Security Menu > API Permissions > choose Drive and Disable All Access.
C) Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
D) Access Apps > G Suite > Drive and Docs > Sharing Settings and disable sharing outside of your domain
Question
Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in G Suite. What should you do?

A) Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.
B) In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.
C) Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.
D) Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.
Question
User A is a Basic License holder. User B is a Business License holder. These two users, along with many additional users, are in the same organizational unit at the same company. When User A attempts to access Drive, they receive the following error: "We are sorry, but you do not have access to Google Docs Editors. Please contact your Organization Administrator for access." User B is not presented with the same error and accesses the service without issues. How do you provide access to Drive for User A?

A) Select User A in the Directory, and under the Apps section, check whether Drive and Docs is disabled. If so, enable it in the User record.
B) In Apps > G Suite > Drive and Docs, select the organizational unit the users are in and enable Drive for the organizational unit.
C) In Apps > G Suite, determine the Group that has Drive and Docs enabled as a service. Add User A to this group.
D) Select User A in the Directory, and under the Licenses section, change their license from Basic to Business to add the Drive and Docs service.
Question
Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, customercare@your-company.com to the cloud platform's email address, your-company@cloudprovider.com. As a security measure, you have mail forwarding disabled at the domain level. What should you do?

A) Create a mail contact in the G Suite directory that has an email address of your-company@cloudprovider.com
B) Create a rule to forward mail in the customercare@your-company.com mailbox to your-company@cloudprovider.com
C) Create a recipient map in the G Suite Admin console that maps customercare@your-company.com to your-company@cloudprovider.com
D) Create a content compliance rule in the G Suite Admin console to change route to your-company@cloudprovider.com
Question
Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled. What two actions should you take to support the chief security officer's request? (Choose two.)

A) Review who has viewed files using the Google Drive Activity Dashboard.
B) Create an alert from Drive Audit reports to notify of external file sharing.
C) Review total external sharing in the Aggregate Reports section.
D) Create a custom Dashboard for external sharing in the Security Investigation Tool.
E) Automatically block external sharing using DLP rules.
Question
How can you monitor increases in user reported Spam as identified by Google?

A) Review post-delivery activity in the Email logs.
B) Review user-reported spam in the Investigation Tool.
C) Review spike in user-reported spam in the Alert center.
D) Review post-delivery activity in the BigQuery Export.
Question
Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization. What should you do?

A) Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
B) Use Work Insights to gather adoption metrics and target your training exercises.
C) Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
D) Use a script to monitor Email attachment types and target users that aren't using Drive sharing.
Question
Your Security Officer ran the Security Health Check and found the alert that "Installation of mobile applications from unknown sources" was occurring. They have asked you to find a way to prevent that from happening. Using Mobile Device Management (MDM), you need to configure a policy that will not allow mobile applications to be installed from unknown sources. What MDM configuration is needed to meet this requirement?

A) In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.
B) In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.
C) In Android Settings, ensure that "Allow non-Play Store apps from unknown sources installation" is unchecked.
D) In Device Management > Setup > Device Approvals menu, configure the "Requires Admin approval" option.
Question
A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access. What should you do?

A) Turn on password expiration.
B) Enforce 2FA with a physical security key.
C) Use a third-party identity provider.
D) Enforce 2FA with Google Authenticator app.
Question
Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes. What action should you take?

A) Company Profile > Profile > New User Features > Enable "Scheduled Release"
B) Apps > Google Workspace > Gmail > Uncheck "Enable Gmail Labs for my users"
C) Company Profile > Profile > New User Features > Enable "Rapid Release"
D) Device Management > Chrome > Device Settings > Stop auto-updates
Question
Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app. What should you do?

A) For the Finance OU, enable the third-party app in SAML apps.
B) For the Finance OU, enable the third-party app in Marketplace Apps.
C) At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.
D) At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.
Question
Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors. What should you do?

A) Educate users on creating personal contacts for the Partner Employees.
B) Add a secondary domain for the Partner Company and create user entries for each Partner user.
C) Create shared contacts in the Directory using the Directory API.
D) Create shared contacts in the Directory using the Domain Shared Contacts API.
Question
A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges. You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs. What two actions should be taken on this call with the user? (Choose two.)

A) Ask the user to send an email to you so you can check the headers.
B) Record a HAR file of the user composing a new email.
C) Take screenshots of the user's screen when composing an email.
D) Use the Email log search in the Admin panel.
E) Check the Users > App Users Activity report.
Question
On which two platforms can you push WiFi connection information with Google Workspace? (Choose two.)

A) Mac OS
B) Windows
C) Chrome OS
D) iOS
E) Linux
Question
Your employer, a media and entertainment company, wants to provision Google Workspace Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact information and initiate collaboration with the VIPs using Google Workspace services such as Docs, Chat, and Calendar. You are responsible for configuring to meet these requirements. What should you do?

A) In the Users list, find the VIPs and turn off the User setting "Directory Sharing."
B) Create a Group for the VIPs and their handlers, and set the Group Access Level to Restricted.
C) In Directory Settings, disable Contact Sharing.
D) Create separate Custom Directories for the VIPs and regular employees.
Question
You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured. Which configuration should you implement?

A) Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
B) Provision accounts within your domain for the external users, and turn off external sharing for that Org.
C) Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.
D) Create a Team Drive for this engagement, and limit the memberships and sharing settings.
Question
Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the G Suite environment. The chief security officer wants that data brought into your existing SIEM system. What are two ways you should accomplish this? (Choose two.)

A) Use the Data Export Tool to export admin audit data to your existing SIEM system
B) Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
C) Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
D) Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
E) Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
Question
Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address. What should you do?

A) Configure a Google Group as an email list.
B) Delegate email access to department employees.
C) Configure a Google Group as a collaborative inbox.
D) Configure a Google Group, and set the Access Level to Announcement Only.
Question
Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say "Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE." You are responsible for making sure that users cannot remove the footer. What should you do?

A) Send an email to each sales person with the instructions on how to add the footer to their Signature.
B) Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.
C) Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.
D) Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.
Question
What action should be taken to configure alerting related to phishing attacks?

A) Set up a Token audit log event alert.
B) Set up an Admin audit log event alert.
C) Set up an email settings changed alert.
D) Set up a suspicious login event alert.
Question
The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue. What two actions should you take? (Choose two.)

A) Obtain the message header and analyze using Google Workspace Toolbox.
B) Review the contents of the messages in Google Vault.
C) Set up a Gmail routing rule to whitelist the sender.
D) Conduct an Email log search to trace the message route.
E) Validate that your domain is not on the Spamhaus blacklist.
Question
Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements. Which combination of attributes will meet this objective?

A) Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
B) Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
C) Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
D) Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
Question
You have configured your Google Workspace account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization. What should you do?

A) Create a new OU and tum on the rapid release track just for this OU.
B) Create a new Google Group with test users and enable the rapid release track.
C) Establish a separate Dev environment, and set it to rapid release.
D) Ask Google for a demo account with beta access to the new features.
Question
Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail's address autocomplete for all users in the domain. What are two options to meet this requirement? (Choose two.)

A) Use the Directory API to upload a .csv file containing the contacts.
B) Configure GCDS to populate a Group with external members.
C) Use the People API to upload a .csv file containing the contacts.
D) Develop a custom application to call the Domain Shared Contacts API.
E) Configure GCDS to synchronize shared contacts.
Question
Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in G Suite Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error. What should you do?

A) Install Google Cloud Directory Sync on all Domain Controllers.
B) Install Google Workspace Sync for Microsoft Outlook on all employees' computers.
C) Install Google Cloud Directory Sync on a supported server.
D) Install Google Apps Manager to automate add-user scripts.
Question
After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request. What should you do?

A) Add the legal team to the User Management Admin system role.
B) Add the legal team to the Google Vault Google Group.
C) Create a custom role with Google Vault access, and add the legal team.
D) Create a matter in Google Vault, and share with the legal team.
Question
Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services. What two features are essential to reconfigure in Google Workspace? (Choose two.)

A) Apps > add SAML apps to your domain.
B) Reconfigure user provisioning via Google Cloud Directory Sync.
C) Replace the third-party IDP verification certificate.
D) Disable SSO with third party IDP.
E) Enable API Permissions for Google Cloud Platform.
Question
Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications. What two actions should you take? (Choose two.)

A) Whitelist Trusted Apps
B) Disable the Drive SDK
C) Restrict API scopes
D) Disable add-ons for Gmail
E) Whitelist Google Workspace Marketplace apps
Question
You have just deployed DMARC to the your-company.com domain. The next day, you start receiving reports that some automated mail from one of your vendors, sending as you, is not being delivered to its recipients. You need to maintain secure email best practices. You received the following SPF, DKIM and DMARC records: v=spf1 a mx ip4 64.233.167.99 include:_spf.google.com -all v=DKIM1;p=MIGfMA0GCSqGSlb3DQEBAQUAA4GNADCBiQKBgQDelhtCv3vUinyhKiKtZ8efjHGGo8gE1T+o7gLrvo6yRtdz9lCe6Fz5sgz0WYFW5nCV4DmaTcS v=DMARC1;p=rekect;rua=mailto:dmarc_rua@pm.dmarcdomain.com ruf=mailto:dmarc_ruf@pm.dmarcdomain.com; fo=1 You need to enable your vendor to resume sending mail on your behalf. What should you do?

A) Change your DMARC record from p=reject to p=none.
B) Change your SPF record from -all to ~all.
C) Add the vendors mail servers to your SPF record.
D) Instruct your vendor to set up your DKIM signature on their systems.
Question
Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing "Secret Project 123." What steps should you take to satisfy this request?

A) Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to "secret project 123." Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, user2@your-company.com. Save.
B) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to: (secret project 123). Save.
C) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your-company.com AND user2@your-company.com. Set the search terms to: secret AND project AND 123. Save.
D) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to secret OR project OR 123. Save.
Question
Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request. What should you do?

A) Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
B) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
C) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
D) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
Question
The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management. What should you do?

A) Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
B) Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of G Suite.
C) Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
D) Change Google Workspace release track to: Rapid Release for faster access to new features.
Question
The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing. What should you do?

A) Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
B) Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
C) Create two Drive Audit Alerts, one for each user, where the Visibility is "Shared Externally," and email them to the Director.
D) Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.
Question
Several customers have reported receiving fake collection notices from your company. The emails were received from accounts.receivable@yourcompany.com, which is the valid address used by your accounting department for such matters, but the email audit log does not show the emails in question. You need to stop these emails from being sent. What two actions should you take? (Choose two.)

A) Change the password for suspected compromised account accounts.receivable@yourcompany.com.
B) Configure a Sender Policy Framework (SPF) record for your domain.
C) Configure Domain Keys Identified Mail (DKIM) to authenticate email.
D) Disable mail delegation for the accounts.receivable@yourcompany.com account.
E) Disable "Allow users to automatically forward incoming email to another address."
Question
The application development team has come to you requesting that a new, internal, domain-owned G Suite app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app. What should you do?

A) Enable all API access for Google Drive.
B) Enable "trust domain owned apps" setting.
C) Add OAuth Client ID to Google Drive Trusted List.
D) Whitelist the app in the Google Workspace Marketplace.
Question
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company's Information Security policy empowers you, as a G Suite admin, to grant provisional access immediately if all of the following conditions are met: Access to the app is restricted to specific individuals by request only. The app does not have the ability to read or manage emails. Immediate notice is given to the Infosec team, followed by the submission of a security risk analysis report within 14 days. Which actions should you take first to ensure that you are compliant with Infosec policy?

A) Move the Senior VP to a sub-OU before enabling Marketplace Settings > "Allow Users to Install Any App from G Suite Marketplace."
B) Confirm that the Senior VP's OU has the following Gmail setting disabled before whitelisting the app: "Let users delegate access to their mailbox."
C) Add the Marketplace app, then review the authorized scopes in Security > Manage API client access.
D) Search the G Suite support forum for feedback about the app to include in the risk analysis report.
Question
HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user. What two actions should you take? (Choose two.)

A) Extend the legal hold on the user's email data.
B) Move project files to a Shared Drive or transfer ownership.
C) Rename the account to the new user starting next week.
D) Delete the account, freeing up a Google Workspace License.
E) Assign the terminated user account an Archive User license.
Question
Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker. What security measures should you implement to secure data?

A) Use Roles, Script, and Owner access permissions for operations on records and data relations.
B) Enable App Maker access only for the Finance department Organization Unit.
C) Use a service account with limited permissions to access each data source.
D) Change owner access permissions to allow internal usage only.
Question
Your large organization, 80,000 users, has been on Google for two years. Your CTO wants to create an integrated team experience with Google Groups, Teams Drives, and Calendar. Users will use a Google Form and Apps Script to request a new "G-Team." A "G-Team' is composed of a Google Group and a Team Drive/Secondary Calendar that is shared using that Google Group. What two design decisions are required to implement this workflow securely? (Choose two.)

A) The Apps Script will need to run as a Google Workspace admin.
B) You will need a Cloud SQL instance to store "G-Team' data.
C) The Google Form will need to be limited to internal users only.
D) The Apps Script will need to run on a timed interval to process new entries.
E) The Google Form will need to enforce Group naming conventions.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Professional Collaboration Engineer
1
A user does not follow their usual sign-in pattern and signs in from an unusual location. What type of alert is triggered by this event?

A) Suspicious mobile activity alert.
B) Suspicious login activity alert.
C) Leaked password alert.
D) User sign-in alert.
Suspicious login activity alert.
2
The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue. What two actions should you take? (Choose two.)

A) Obtain the message header and analyze using G Suite Toolbox.
B) Review the contents of the messages in Google Vault.
C) Set up a Gmail routing rule to whitelist the sender.
D) Conduct an Email log search to trace the message route.
E) Validate that your domain is not on the Spamhaus blacklist.
Obtain the message header and analyze using G Suite Toolbox.
Set up a Gmail routing rule to whitelist the sender.
3
You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly. What should you do?

A) Use the bulk upload with CSV feature in the G Suite Admin panel to update all Groups.
B) Update your configuration file and resync mailing lists with Google Cloud Directory Sync.
C) Create and assign a custom admin role for all group owners so they can update settings.
D) Use the Groups Settings API to update Google Groups with desired settings.
Use the bulk upload with CSV feature in the G Suite Admin panel to update all Groups.
4
In the years prior to your organization moving to G Suite, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on G Suite.) You were able to address active employees' use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account. What should you do?

A) Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-G Suite Google services and have them blocked.
B) Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
C) Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
D) Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all G Suite and Other Google Services disabled.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network. Where should you enable this in the Chrome management settings?

A) Randomly scatter auto-updates.
B) Update over cellular.
C) Disable Auto update.
D) Throttle the bandwidth.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information. What should you do?

A) Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
B) Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
C) Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
D) Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
Your company recently migrated to G Suite and wants to deploy a commonly used third-party app to all of finance. Your OU structure in G Suite is broken down by department. You need to ensure that the correct users get this app. What should you do?

A) For the Finance OU, enable the third-party app in SAML apps.
B) For the Finance OU, enable the third-party app in Marketplace Apps.
C) At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the G Suite Marketplace.
D) At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the G Suite Marketplace.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named G Suite accounts (e.g., user1@your-company.com, user2@your-company.com, user3@your-company.com). The manager of this program wants all email to these accounts routed to the manager's mailbox account also. What should you do?

A) Setup address forwarding in each account's GMail setting menu.
B) Set up recipient address mapping in GMail Advanced Settings.
C) Configure an Inbound Gateway route.
D) Give the manager delegated access to the mailboxes.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
Your company moved to G Suite last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session. How should you accomplish this?

A) In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.
B) Room participants will need to start the meeting from the remote in the room.
C) By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.
D) Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes. What action should you take?

A) Company Profile > Profile > New User Features > Enable "Scheduled Release"
B) Apps > G Suite > Gmail > Uncheck "Enable Gmail Labs for my users"
C) Company Profile > Profile > New User Features > Enable "Rapid Release"
D) Device Management > Chrome > Device Settings > Stop auto-updates
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator. What should you do?

A) Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
B) Change Enrollment Controls to Place Chrome device in user organization.
C) Change Enrollment Controls to Keep Chrome device in current location.
D) Change Enrolment Permissions to not allow users in this organization to enroll new devices.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit. What should you do?

A) From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.
B) From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.
C) From the G Suite Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.
D) From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
The application development team has come to you requesting that a new, internal, domain-owned G Suite app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app. What should you do?

A) Enable all API access for Google Drive.
B) Enable "trust domain owned apps" setting.
C) Add OAuth Client ID to Google Drive Trusted List.
D) Whitelist the app in the G Suite Marketplace.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU. What should you do?

A) Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
B) Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
C) Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
D) Create an approved senders list at the Market Research OU that contains the mass email sender addresses.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it. What should you do?

A) Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.
B) Using the Gmail Audit log, perform a search for the email, export the results, then import with G Suite Migration for Microsoft Outlook.
C) Using the Message ID, contact Google G Suite support to recover the email, then import with G Suite Migration for Microsoft Outlook.
D) Using the Vault Audit log, perform a search for the email, export the results. then import with G Suite Migration for Microsoft Outlook.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
Security and Compliance has identified that data is being leaked through a third-party application connected to G Suite? You want to investigate using an audit log. What log should you use?

A) Admin audit log
B) SAML audit log
C) Drive usage audit log
D) OAuth Token audit log
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
You are supporting an investigation that is being conducted by your litigation team. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user's awareness. What two actions should you take? (Choose two.)

A) Move the user to their own Organization Unit, and set a custom retention policy
B) Create a matter using Google Vault, and share the matter with the litigation team members.
C) Create a hold on the user's mailbox in Google Vault
D) Reset the user's password, and share the new password with the litigation team.
E) Copy the user's data to a secondary account.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
You have configured your G Suite account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization. What should you do?

A) Create a new OU and tum on the rapid release track just for this OU.
B) Create a new Google Group with test users and enable the rapid release track.
C) Establish a separate Dev environment, and set it to rapid release.
D) Ask Google for a demo account with beta access to the new features.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
In your organization, users have been provisioned with either G Suite Enterprise, G Suite Business, or no license, depending on their job duties, and the cost of user licenses is paid out of each division's budget. In order to effectively manage the license disposition, team leaders require the ability to look up the type of license that is currently assigned, along with the last logon date, for their direct reports. You have been tasked with recommending a solution to the Director of IT, and have gathered the following requirements: Team leaders must be able to retrieve this data on their own (i.e., self-service). Team leaders are not permitted to have any level of administrative access to the G Suite Admin panel. Team leaders must only be able to look up data for their direct reports. The data must always be current to within 1 week. Costs must be mitigated. What approach should you recommend?

A) Export log data to BigQuery with custom scopes.
B) Use a third-party tool.
C) Use App Script and filter views within a Google Sheet.
D) Create an app using AppMaker and App Script.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Your organization has been on G Suite Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the G Suite environment. The chief security officer wants that data brought into your existing SIEM system. What are two ways you should accomplish this? (Choose two.)

A) Use the Data Export Tool to export admin audit data to your existing SIEM system
B) Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
C) Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
D) Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
E) Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
Your chief compliance officer is concerned about API access to organization data across different cloud vendors. He has tasked you with compiling a list of applications that have API access to G Suite data, the data they have access to, and the number of users who are using the applications. How should you compile the data being requested?

A) Review the authorized applications for each user via the G Suite Admin panel.
B) Create a survey via Google forms, and collect the application data from users.
C) Review the token audit log, and compile a list of all the applications and their scopes.
D) Review the API permissions installed apps list, and export the list.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
Your business partner requests that a new custom cloud application be set up to log in without having separate credentials. What is your business partner required to provide in order to proceed?

A) Service provider logout URL
B) Service provider ACS URL
C) Identity Provider URL
D) Service provider certificate
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
Your CISO is concerned about third party applications becoming compromised and exposing G Suite data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?

A) Create a report using the OAuth Token Audit Activity logs.
B) Create a report using the Calendar Audit Activity logs.
C) Create a report using the Drive Audit Activity logs.
D) Create a reporting using the API Permissions logs for Installed Apps.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward. What should you do?

A) Disable access to all "Other Services" in the G Suite Admin Console.
B) Use the Transfer Tool for unmanaged accounts to invite users into the domain.
C) Use the Data Migration Service to transfer the data to a managed account.
D) Open a support ticket to have Google transfer unmanaged accounts into your domain.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
The organization has conducted and completed Security Awareness Training (SAT) for all employees. As part of a new security policy, employees who did not complete the SAT have had their accounts suspended. The CTO has requested to be informed of any accounts that have been re-enabled to ensure no one is in violation of the new security policy. What should you do?

A) Enable "Suspicious login" rule - Other Recipients: CTO
B) Enable "Suspended user made active" rule - Other Recipients: CTO
C) Enable "Email settings changed" rule - -Other Recipients: CTO
D) Enable "Suspended user made active" rule and select "Deliver to" Super Administrator(s)
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else. What two things should you do? (Choose two.)

A) Disable Guest Mode and Public Sessions.
B) Enable a Device Policy of Sign In Screen and add the employee email address.
C) Enroll a 2-Factor hardware key on the device using the employee email address.
D) Enable a User Policy of Multiple Sign In Access and add just the employee email address.
E) Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Worspace data should be stored in a separate backup environment. How should you store data for this situation?

A) Use routing rules to dual-deliver mail to an on-premises SMTP server and Google Worspace.
B) Write a script and use Google Worspace APIs to access and download user data.
C) Use a third-party tool to configure secure backup of Google Worspace data.
D) Train users to use Google Takeout and store their archives locally.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
After a recent transition to G Suite, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff. What should you do?

A) Create a custom Apps Script to reset passwords.
B) Use a third-party tool for password recovery.
C) Enable non-admin password recovery.
D) Create a Google form to submit reset requests.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration. Which scenario could require an alternative deployment strategy?

A) Some of your Active Directory groups have sensitive group membership.
B) Some of the Active Directory groups do not have owners.
C) Some of the Active Directory groups have members external to organization.
D) Some of the Active Directory groups do not have email addresses.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
Your organization syncs directory data from Active Directory to G Suite via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data. What two actions should you take? (Choose two.)

A) Add the user's old email address to their account in the G Suite Admin panel.
B) Change the user's primary email address in the G Suite Admin panel.
C) Change the user's last name in the G Suite Admin panel.
D) Change the user's primary email in Active Directory.
E) Change the user's last name in Active Directory.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again. What two actions should you take? (Choose two.)

A) Configure objectionable content to reject messages with the words "wire transfer."
B) Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
C) Create a rule requiring secure transport for all messages regarding wire transfers.
D) Add the sender of the wire transfer email to the blocked senders list.
E) Enable all admin settings in Gmail's safety > spoofing and authentication.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
All Human Resources employees at your company are members of the "HR Department" Team Drive. The HR Director wants to enact a new policy to restrict access to the "Employee Compensation" subfolder stored on that Team Drive to a small subset of the team. What should you do?

A) Use the Drive API to modify the permissions of the Employee Compensation subfolder.
B) Use the Drive API to modify the permissions of the individual files contained within the subfolder.
C) Move the contents of the subfolder to a new Team Drive with only the relevant team members.
D) Move the subfolder to the HR Director's MyDrive and share it with the relevant team members.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy. What should you do?

A) Access the Security Menu> API Reference > disable all API Access.
B) Access the Security Menu > API Permissions > choose Drive and Disable All Access.
C) Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
D) Access Apps > G Suite > Drive and Docs > Sharing Settings and disable sharing outside of your domain
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in G Suite. What should you do?

A) Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.
B) In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.
C) Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.
D) Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
User A is a Basic License holder. User B is a Business License holder. These two users, along with many additional users, are in the same organizational unit at the same company. When User A attempts to access Drive, they receive the following error: "We are sorry, but you do not have access to Google Docs Editors. Please contact your Organization Administrator for access." User B is not presented with the same error and accesses the service without issues. How do you provide access to Drive for User A?

A) Select User A in the Directory, and under the Apps section, check whether Drive and Docs is disabled. If so, enable it in the User record.
B) In Apps > G Suite > Drive and Docs, select the organizational unit the users are in and enable Drive for the organizational unit.
C) In Apps > G Suite, determine the Group that has Drive and Docs enabled as a service. Add User A to this group.
D) Select User A in the Directory, and under the Licenses section, change their license from Basic to Business to add the Drive and Docs service.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, customercare@your-company.com to the cloud platform's email address, your-company@cloudprovider.com. As a security measure, you have mail forwarding disabled at the domain level. What should you do?

A) Create a mail contact in the G Suite directory that has an email address of your-company@cloudprovider.com
B) Create a rule to forward mail in the customercare@your-company.com mailbox to your-company@cloudprovider.com
C) Create a recipient map in the G Suite Admin console that maps customercare@your-company.com to your-company@cloudprovider.com
D) Create a content compliance rule in the G Suite Admin console to change route to your-company@cloudprovider.com
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled. What two actions should you take to support the chief security officer's request? (Choose two.)

A) Review who has viewed files using the Google Drive Activity Dashboard.
B) Create an alert from Drive Audit reports to notify of external file sharing.
C) Review total external sharing in the Aggregate Reports section.
D) Create a custom Dashboard for external sharing in the Security Investigation Tool.
E) Automatically block external sharing using DLP rules.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
How can you monitor increases in user reported Spam as identified by Google?

A) Review post-delivery activity in the Email logs.
B) Review user-reported spam in the Investigation Tool.
C) Review spike in user-reported spam in the Alert center.
D) Review post-delivery activity in the BigQuery Export.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization. What should you do?

A) Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
B) Use Work Insights to gather adoption metrics and target your training exercises.
C) Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
D) Use a script to monitor Email attachment types and target users that aren't using Drive sharing.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
Your Security Officer ran the Security Health Check and found the alert that "Installation of mobile applications from unknown sources" was occurring. They have asked you to find a way to prevent that from happening. Using Mobile Device Management (MDM), you need to configure a policy that will not allow mobile applications to be installed from unknown sources. What MDM configuration is needed to meet this requirement?

A) In the Application Management menu, configure the whitelist of apps that Android and iOS devices are allowed to install.
B) In the Application Management menu, configure the whitelist of apps that Android, iOS devices, and Active Sync devices are allowed to install.
C) In Android Settings, ensure that "Allow non-Play Store apps from unknown sources installation" is unchecked.
D) In Device Management > Setup > Device Approvals menu, configure the "Requires Admin approval" option.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access. What should you do?

A) Turn on password expiration.
B) Enforce 2FA with a physical security key.
C) Use a third-party identity provider.
D) Enforce 2FA with Google Authenticator app.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes. What action should you take?

A) Company Profile > Profile > New User Features > Enable "Scheduled Release"
B) Apps > Google Workspace > Gmail > Uncheck "Enable Gmail Labs for my users"
C) Company Profile > Profile > New User Features > Enable "Rapid Release"
D) Device Management > Chrome > Device Settings > Stop auto-updates
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
Your company recently migrated to Google Workspace and wants to deploy a commonly used third-party app to all of finance. Your OU structure in Google Workspace is broken down by department. You need to ensure that the correct users get this app. What should you do?

A) For the Finance OU, enable the third-party app in SAML apps.
B) For the Finance OU, enable the third-party app in Marketplace Apps.
C) At the root level, disable the third-party app. For the Finance OU, allow users to install any application from the Google Workspace Marketplace.
D) At the root level, disable the third-party app. For the Finance OU, allow users to install only whitelisted apps from the Google Workspace Marketplace.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors. What should you do?

A) Educate users on creating personal contacts for the Partner Employees.
B) Add a secondary domain for the Partner Company and create user entries for each Partner user.
C) Create shared contacts in the Directory using the Directory API.
D) Create shared contacts in the Directory using the Domain Shared Contacts API.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges. You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs. What two actions should be taken on this call with the user? (Choose two.)

A) Ask the user to send an email to you so you can check the headers.
B) Record a HAR file of the user composing a new email.
C) Take screenshots of the user's screen when composing an email.
D) Use the Email log search in the Admin panel.
E) Check the Users > App Users Activity report.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
On which two platforms can you push WiFi connection information with Google Workspace? (Choose two.)

A) Mac OS
B) Windows
C) Chrome OS
D) iOS
E) Linux
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
Your employer, a media and entertainment company, wants to provision Google Workspace Enterprise accounts on your domain for several world-famous celebrities. Leadership is concerned with ensuring that these VIPs are afforded a high degree of privacy. Only a small group of senior employees must be able to look up contact information and initiate collaboration with the VIPs using Google Workspace services such as Docs, Chat, and Calendar. You are responsible for configuring to meet these requirements. What should you do?

A) In the Users list, find the VIPs and turn off the User setting "Directory Sharing."
B) Create a Group for the VIPs and their handlers, and set the Group Access Level to Restricted.
C) In Directory Settings, disable Contact Sharing.
D) Create separate Custom Directories for the VIPs and regular employees.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured. Which configuration should you implement?

A) Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
B) Provision accounts within your domain for the external users, and turn off external sharing for that Org.
C) Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.
D) Create a Team Drive for this engagement, and limit the memberships and sharing settings.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the G Suite environment. The chief security officer wants that data brought into your existing SIEM system. What are two ways you should accomplish this? (Choose two.)

A) Use the Data Export Tool to export admin audit data to your existing SIEM system
B) Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
C) Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
D) Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
E) Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address. What should you do?

A) Configure a Google Group as an email list.
B) Delegate email access to department employees.
C) Configure a Google Group as a collaborative inbox.
D) Configure a Google Group, and set the Access Level to Announcement Only.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say "Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE." You are responsible for making sure that users cannot remove the footer. What should you do?

A) Send an email to each sales person with the instructions on how to add the footer to their Signature.
B) Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.
C) Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.
D) Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
What action should be taken to configure alerting related to phishing attacks?

A) Set up a Token audit log event alert.
B) Set up an Admin audit log event alert.
C) Set up an email settings changed alert.
D) Set up a suspicious login event alert.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
The CEO of your company has indicated that messages from trusted contacts are being delivered to spam, and it is significantly affecting their work. The messages from these contacts have not always been classified as spam. Additionally, you recently configured SPF, DKIM, and DMARC for your domain. You have been tasked with troubleshooting the issue. What two actions should you take? (Choose two.)

A) Obtain the message header and analyze using Google Workspace Toolbox.
B) Review the contents of the messages in Google Vault.
C) Set up a Gmail routing rule to whitelist the sender.
D) Conduct an Email log search to trace the message route.
E) Validate that your domain is not on the Spamhaus blacklist.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
Your company's compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company's account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements. Which combination of attributes will meet this objective?

A) Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
B) Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
C) Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
D) Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
You have configured your Google Workspace account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization. What should you do?

A) Create a new OU and tum on the rapid release track just for this OU.
B) Create a new Google Group with test users and enable the rapid release track.
C) Establish a separate Dev environment, and set it to rapid release.
D) Ask Google for a demo account with beta access to the new features.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
Your corporate LDAP contains the email addresses of several hundred non-employee business partners. You want to sync these contacts to Google Workspace so they appear in Gmail's address autocomplete for all users in the domain. What are two options to meet this requirement? (Choose two.)

A) Use the Directory API to upload a .csv file containing the contacts.
B) Configure GCDS to populate a Group with external members.
C) Use the People API to upload a .csv file containing the contacts.
D) Develop a custom application to call the Domain Shared Contacts API.
E) Configure GCDS to synchronize shared contacts.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts. When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in G Suite Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error. What should you do?

A) Install Google Cloud Directory Sync on all Domain Controllers.
B) Install Google Workspace Sync for Microsoft Outlook on all employees' computers.
C) Install Google Cloud Directory Sync on a supported server.
D) Install Google Apps Manager to automate add-user scripts.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request. What should you do?

A) Add the legal team to the User Management Admin system role.
B) Add the legal team to the Google Vault Google Group.
C) Create a custom role with Google Vault access, and add the legal team.
D) Create a matter in Google Vault, and share with the legal team.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services. What two features are essential to reconfigure in Google Workspace? (Choose two.)

A) Apps > add SAML apps to your domain.
B) Reconfigure user provisioning via Google Cloud Directory Sync.
C) Replace the third-party IDP verification certificate.
D) Disable SSO with third party IDP.
E) Enable API Permissions for Google Cloud Platform.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications. What two actions should you take? (Choose two.)

A) Whitelist Trusted Apps
B) Disable the Drive SDK
C) Restrict API scopes
D) Disable add-ons for Gmail
E) Whitelist Google Workspace Marketplace apps
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
You have just deployed DMARC to the your-company.com domain. The next day, you start receiving reports that some automated mail from one of your vendors, sending as you, is not being delivered to its recipients. You need to maintain secure email best practices. You received the following SPF, DKIM and DMARC records: v=spf1 a mx ip4 64.233.167.99 include:_spf.google.com -all v=DKIM1;p=MIGfMA0GCSqGSlb3DQEBAQUAA4GNADCBiQKBgQDelhtCv3vUinyhKiKtZ8efjHGGo8gE1T+o7gLrvo6yRtdz9lCe6Fz5sgz0WYFW5nCV4DmaTcS v=DMARC1;p=rekect;rua=mailto:dmarc_rua@pm.dmarcdomain.com ruf=mailto:dmarc_ruf@pm.dmarcdomain.com; fo=1 You need to enable your vendor to resume sending mail on your behalf. What should you do?

A) Change your DMARC record from p=reject to p=none.
B) Change your SPF record from -all to ~all.
C) Add the vendors mail servers to your SPF record.
D) Instruct your vendor to set up your DKIM signature on their systems.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing "Secret Project 123." What steps should you take to satisfy this request?

A) Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to "secret project 123." Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, user2@your-company.com. Save.
B) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to: (secret project 123). Save.
C) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your-company.com AND user2@your-company.com. Set the search terms to: secret AND project AND 123. Save.
D) Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to secret OR project OR 123. Save.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
Your cyber security team has requested that all email destined for external domains be scanned for credit card numbers, and if found, the email must be encrypted using your cloud-based third-party encryption provider. You are responsible for configuring to meet this request. What should you do?

A) Create a content compliance rule on outbound mail and internal-sending mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
B) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Encrypt message if not encrypted".
C) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and add a custom header that your third-party encryption provider can scan for and encrypt.
D) Create a content compliance rule on outbound mail using the predefined rule for credit card numbers, and check "Change route" to send to your third-party encryption provider to encrypt.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management. What should you do?

A) Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
B) Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of G Suite.
C) Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
D) Change Google Workspace release track to: Rapid Release for faster access to new features.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
The Director of your Finance department has asked to be alerted if two financial auditors share any files outside the domain. You need to set an Admin Alert on Drive Sharing. What should you do?

A) Create a Google Group that has the two auditors as members, and then create a Drive DLP Rule that is assigned to that Group.
B) Create a Content Compliance rule that looks for outbound share notifications from those two users, and Bcc the Director on those emails.
C) Create two Drive Audit Alerts, one for each user, where the Visibility is "Shared Externally," and email them to the Director.
D) Check the Admin Console Dashboard Insights page periodically for external shares, and notify the Director of any changes.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
Several customers have reported receiving fake collection notices from your company. The emails were received from accounts.receivable@yourcompany.com, which is the valid address used by your accounting department for such matters, but the email audit log does not show the emails in question. You need to stop these emails from being sent. What two actions should you take? (Choose two.)

A) Change the password for suspected compromised account accounts.receivable@yourcompany.com.
B) Configure a Sender Policy Framework (SPF) record for your domain.
C) Configure Domain Keys Identified Mail (DKIM) to authenticate email.
D) Disable mail delegation for the accounts.receivable@yourcompany.com account.
E) Disable "Allow users to automatically forward incoming email to another address."
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
The application development team has come to you requesting that a new, internal, domain-owned G Suite app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app. What should you do?

A) Enable all API access for Google Drive.
B) Enable "trust domain owned apps" setting.
C) Add OAuth Client ID to Google Drive Trusted List.
D) Whitelist the app in the Google Workspace Marketplace.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted. The company's Information Security policy empowers you, as a G Suite admin, to grant provisional access immediately if all of the following conditions are met: Access to the app is restricted to specific individuals by request only. The app does not have the ability to read or manage emails. Immediate notice is given to the Infosec team, followed by the submission of a security risk analysis report within 14 days. Which actions should you take first to ensure that you are compliant with Infosec policy?

A) Move the Senior VP to a sub-OU before enabling Marketplace Settings > "Allow Users to Install Any App from G Suite Marketplace."
B) Confirm that the Senior VP's OU has the following Gmail setting disabled before whitelisting the app: "Let users delegate access to their mailbox."
C) Add the Marketplace app, then review the authorized scopes in Security > Manage API client access.
D) Search the G Suite support forum for feedback about the app to include in the risk analysis report.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user. What two actions should you take? (Choose two.)

A) Extend the legal hold on the user's email data.
B) Move project files to a Shared Drive or transfer ownership.
C) Rename the account to the new user starting next week.
D) Delete the account, freeing up a Google Workspace License.
E) Assign the terminated user account an Archive User license.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker. What security measures should you implement to secure data?

A) Use Roles, Script, and Owner access permissions for operations on records and data relations.
B) Enable App Maker access only for the Finance department Organization Unit.
C) Use a service account with limited permissions to access each data source.
D) Change owner access permissions to allow internal usage only.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
Your large organization, 80,000 users, has been on Google for two years. Your CTO wants to create an integrated team experience with Google Groups, Teams Drives, and Calendar. Users will use a Google Form and Apps Script to request a new "G-Team." A "G-Team' is composed of a Google Group and a Team Drive/Secondary Calendar that is shared using that Google Group. What two design decisions are required to implement this workflow securely? (Choose two.)

A) The Apps Script will need to run as a Google Workspace admin.
B) You will need a Cloud SQL instance to store "G-Team' data.
C) The Google Form will need to be limited to internal users only.
D) The Apps Script will need to run on a timed interval to process new entries.
E) The Google Form will need to enforce Group naming conventions.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 71 flashcards in this deck.