Professional Google Workspace Administrator v1.0 (Professional Google Workspace Administrator)

Page:    1 / 6   
Total 84 questions

Multiple users across the organization are experiencing video degradation in Meet video calls. As an administrator, what steps should you take to start troubleshooting?

  • A. Troubleshoot network bandwidth for the organizer of the meeting.
  • B. Push the Meet quality tool to end user devices and run local reports to determine connectivity issues.
  • C. Locate the Meet quality tool, and review the output for issues with quality.
  • D. Update the Admin Console Meet settings to disable streaming.


Answer : C

As the Workspace Administrator, you have been asked to enable the help desk team to share incoming support requests from end users. The help desk team has ten users who need to respond to support requests that are sent to a help desk email address. The users must be able to respond by email and assign ownership of tickets. Finally, the help desk team is highly mobile and will need to manage help desk tickets from their mobile devices. How would you provide this functionality for the help desk team?

  • A. Configure a Google Group as a collaborative inbox, and assign the required Groups permissions to the help desk team members.
  • B. Create a help desk Workspace mail account, and set the help desk team as mail delegates to the help desk account.
  • C. Create the help desk group as a Q&A Group, and add the "Manager" role to the help desk team users.
  • D. In Google Drive, create a help desk request form, and give the help desk team the ability to view the inbound requests.


Answer : B

Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.

You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing. Which two solutions would help you mitigate the risk at minimal cost? (Choose two.)

  • A. Deploy 2-Step Verification for all users who have security keys.
  • B. Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.
  • C. Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.
  • D. Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.
  • E. For all executives, create new accounts with random characters to match Google best practices, migrate data from the former accounts, and then delete them.


Answer : CD

As a Google Workspace administrator for your organization, you are tasked with identifying how users are reporting their messages – whether spam, not spam, or phishing – for a specific time period. How do you find this information?

  • A. Open Admin Console > Security > Dashboard > User Reports.
  • B. Open Admin Console > Security > Dashboard > Spam Filter- Phishing.
  • C. Use Reports API to query user Gmail activity.
  • D. Open Admin Console > Reporting > Email Log Search.


Answer : C

The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?

  • A. Configure a safety rule to protect against encrypted attachments from untrusted senders.
  • B. Configure a safety rule to protect against attachments with scripts from untrusted senders.
  • C. In the security sandbox section, enable virtual execution of attachments for the targeted OU.
  • D. In the security sandbox section, enable virtual execution of attachments for the entire organization.


Answer : C

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?

  • A. Automatic Room Replacement does not work on recurring events.
  • B. This feature requires calendar event owners to have the Buildings and resources administrator privilege.
  • C. The calendar resources do not have the Resource Category configured as CONFERENCE_ROOM.
  • D. The events have more than 20 attendees.


Answer : D

A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?

  • A. Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.
  • B. Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.
  • C. Immediately suspend the user's account, assign an archived user license, and export data.
  • D. Suspend the user's account, search all associated users data in Google Vault, and export the data.


Answer : C

A user has reported that they did not receive an email from one of their normal correspondents. What information do you need to collect from the user to investigate the cause of the issue?

  • A. The email address of the sender and the subject and date/time of the missing message.
  • B. The type of device the individual is using, including the OS version, browser, and browser version.
  • C. The sender's domain so you can review their SPF and DKIM configuration.
  • D. The sender's IP address, mail client, and mail platform.


Answer : A

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add, edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?

  • A. Set up the shared drive, and add the users as Content Managers of the drive.
  • B. Set up the shared drive, and add the users as editors of the drive.
  • C. Set up the shared drive, and add the users as Contributors of the drive.
  • D. Set up the shared drive, and add the users as Managers of the drive.


Answer : C

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?

  • A. Disable 2-Step Verification per organizational unit so the affected users can sign in.
  • B. Move the affected users into the exception group temporarily so they can set up 2-Step Verification, and then remove them from the exception group after successful sign-in is confirmed.
  • C. Disable 2-Step Verification organization-wide so all users can successfully sign in.
  • D. Move the affected users into the exception group permanently so they do not have to use 2-Step Verification going forward.


Answer : C

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?

  • A. Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.
  • B. Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.
  • C. Set the option "Allow calendar-based room release" for all targeted rooms.
  • D. Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.


Answer : A

Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain. What is the best way to achieve this for these new users, without updating the information of preexisting users?

  • A. Add the acquired domain as an alias to the primary Google Workspace domain.
  • B. Add the acquired domain as a secondary domain to the primary Google Workspace domain, and then update the email information of all new users with alias emails.
  • C. Update the Google-provided test domain to be the domain of the acquired company, and then update the email information of all new users with alias emails.
  • D. Without adding a domain, update each user's email information with the previous domain.


Answer : D

The application development team requests that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using an approved allowlist, per security policy. You need to grant access for this app. What should you do?

  • A. Enable all API access for Google Drive.
  • B. Enable the "trust domain owned apps" setting.
  • C. Add OAuth Client ID to the Google Drive Trusted List.
  • D. Allowlist the app in the Google Workspace Marketplace.


Answer : A

An administrator accidentally deleted several Workspace user accounts from the Google Admin Console two weeks ago. How can you recover the deleted user accounts?

  • A. Open a Google support ticket, and request a recovery of all recently deleted users.
  • B. Sign in to the Ad min console as Help Desk Admin, open user management, filter for "recently deleted," and recover.
  • C. Sign in to the Admin console as Super Admin, open user management, filter for "recently deleted," and recover.
  • D. Create a matter, go to legal hold, and create a legal hold for the user accounts.


Answer : D

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?

  • A. Use the security center to remove the messages from users' mailboxes.
  • B. Use Google Vault to remove these messages from users' mailboxes.
  • C. Enable a safety rule to send these types of messages to spam.
  • D. Enable a safety rule to send these types of messages to a quarantine.


Answer : C

Page:    1 / 6   
Total 84 questions