Associate Google Workspace Administrator v1.0

Page:    1 / 5   
Exam contains 73 questions

You work for a healthcare provider that uses an external medical billing company to manage patient records and invoices. Your organization’s employees need to share patient documents with the billing company’s employees for processing. You need to configure access so the medical billing company’s employees can view and edit the documents, but they cannot delete the documents. What should you do?

  • A. Create a shared drive that is managed by your organization’s employees. Grant Contributor access to the billing company’s staff.
  • B. Create a shared drive. Grant Content Manager access to your organization’s employees and the billing company.
  • C. Create a group, and add the employees from your organization and the billing company. Create a shared folder on Google Drive. Grant Editor access to the group
  • D. Restrict access for the medical billing company’s employees by using Data Loss Prevention (DLP) policies.


Answer : A

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

  • A. Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.
  • B. Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers
  • C. Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.
  • D. Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.


Answer : A

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

  • A. Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.
  • B. Set up email forwarding from your on-premises email provider to Gmail.
  • C. Create a content compliance rule to filter and route incoming emails.
  • D. Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.


Answer : A

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?

  • A. Create and enforce a new password policy for all users in your organization.
  • B. Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.
  • C. Create an activity rule that is triggered by the User’s password changed event. Add compliance team members as email recipients.
  • D. Create a new alert by using user log events. Check that the challenge type is “Password”, and add the compliance team as email recipients.


Answer : C

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

  • A. Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.
  • B. Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.
  • C. Disable and re-enable the Calendar service for the affected users to refresh their connection.
  • D. Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.


Answer : A

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.
What should you do?

  • A. Export the resource list to a CSV file, make the changes, and re-import the updated file.
  • B. Edit each resource in the Google Admin console.
  • C. Add the modified rooms as new resources. Tell employees not to use old rooms.
  • D. Delete the existing resources and recreate the resources with the updated information.


Answer : A

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.
You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

  • A. Configure the allowed list of apps in the Devices page in the apps and extensions settings.
  • B. Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.
  • C. Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.
  • D. Require 2SV for user logins.


Answer : A

Your company’s help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?

  • A. Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.
  • B. Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).
  • C. Turn off more aggressive spam filtering in spam policies that are applied to the users’ organizational unit and add the senders’ mail system IP addresses to the email allowlist.
  • D. Create an address list of approved senders so messages from these users bypass Gmail’s spam filters and recipients can decide whether they are spam or not.


Answer : A

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

  • A. Conduct a Vault search to find this email and identify if additional users were affected.
  • B. Conduct a search to find all emails sent by the sender by using the Gmail API.
  • C. Conduct an Email reports search to find this email and all of the email’s recipients.
  • D. Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.


Answer : D

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

  • A. Turn Google Sites access on for each of the 15 users in the task force.
  • B. Create a configuration group for the task force’s 15 users. Grant Google Sites access to the group.
  • C. Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.
  • D. Create an access group for the task force’s 15 users. Grant Google Sites access to the group.


Answer : C

Your organization collects credit card information in customer files. You need to implement a policy for your organization’s Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?

  • A. Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to “block external sharing”, and enables the “Log event” option.
  • B. Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.
  • C. Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.
  • D. Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.


Answer : A

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

  • A. Analyze the audit log in the Admin console for device and application activity.
  • B. Analyze the security investigation tool to access device log data.
  • C. Analyze the Google Workspace reporting section of the Admin console.
  • D. Analyze the User Accounts section in the Google Admin console.


Answer : A

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

  • A. Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.
  • B. Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.
  • C. Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”
  • D. Set up an inbox for the customer support team. Provide the login credentials to the customer support team.


Answer : A

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external Google Groups with their Google Workspace accounts without interrupting internal group usage. What should you do?

  • A. Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.
  • B. In Additional Google Services, turn Google Groups OFF at the root organizational unit.
  • C. Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.
  • D. Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.


Answer : A

You manage Chrome Enterprise browsers for your large organization. You want to ensure that specific extensions are automatically installed on all managed Chrome Enterprise browsers. What should you do?

  • A. Allowlist the specific Chrome browser extensions.
  • B. Configure a script to deploy the extensions upon user login.
  • C. Publish the extensions in the Chrome Web Store.
  • D. Force-install the extensions through Chrome browser policies.


Answer : D

Page:    1 / 5   
Exam contains 73 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy