Winter Sale Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Associate Google Workspace Administrator Question and Answers

Associate Google Workspace Administrator

Last Update Nov 3, 2025
Total Questions : 101

We are offering FREE Google-Workspace-Administrator Google exam questions. All you do is to just go and sign up. Give your details, prepare Google-Workspace-Administrator free exam questions and then go for complete pool of Associate Google Workspace Administrator test questions that will help you more.

Google-Workspace-Administrator pdf

Google-Workspace-Administrator PDF

$42  $104.99
Google-Workspace-Administrator Engine

Google-Workspace-Administrator Testing Engine

$50  $124.99
Google-Workspace-Administrator PDF + Engine

Google-Workspace-Administrator PDF + Testing Engine

$66  $164.99
Questions 1

You are applying device and user policies for employees in your organization who are in different departments. You need each department to have a different set of policies. You want to follow Google-recommended practices. What should you do?

Options:

A.  

Create separate top-level organizational units for each department.

B.  

Create an Access group for each department. Configure the applicable policies.

C.  

Add all managed users and devices in the top-level organizational unit.

D.  

Create a child organizational unit for each department.

Discussion 0
Questions 2

The innovation team at your organization has a dedicated room with prototype equipment. You need to make the room bookable, add the equipment, and ensure that there are no booking conflicts. Only the innovation team and the sales directors can access this room. What should you do?

Options:

A.  

Create a separate Google Calendar resource for the room. Manually manage booking requests from both teams.

B.  

Create a Google Group for the innovation team and another Google Group for sales directors. Share the room's calendar with both groups.

C.  

Create a Google Calendar event for the room. Share the event with the innovation team and sales directors.

D.  

Edit the Google Calendar settings for the room resource. Adjust the permission settings so only the innovation team and sales director group can view and book time on this calendar.

Discussion 0
Questions 3

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.  

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.  

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.  

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.  

Require 2SV for user logins.

Discussion 0
Questions 4

External sharing at your company is only permitted for the sales and marketing department. Engineering is not allowed to share externally. You need to configure the sharing settings to comply with this policy. What should you do?

Options:

A.  

Use a data loss prevention (DLP) solution to control external sharing based on user groups.

B.  

Create separate shared drives for each department with different external sharing settings.

C.  

Create organizational units (OUs) for each department. Configure different external sharing settings for each OU.

D.  

Configure Drive trust rules to restrict the engineering department from sharing externally.

Discussion 0
Questions 5

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

Options:

A.  

Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.

B.  

Set up email forwarding from your on-premises email provider to Gmail.

C.  

Create a content compliance rule to filter and route incoming emails.

D.  

Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.

Discussion 0
Questions 6

Your organization wants to prevent a group of users from logging into their Google Drive when they are traveling internationally for business.

You have added these users to an organizational unit (OU). You need to secure the users’ access to the Google Drive app to meet this requirement.

What should you do?

Options:

A.  

Disable Google Drive for users in the OU.

B.  

Define location-based access levels. Assign the levels to the Google Drive app for the OU.

C.  

Require 2-step verification (2SV) when users in the OU sign in.

D.  

Define user-based access levels. Assign the levels to the Google Drive app for the OU.

Discussion 0
Questions 7

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.  

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.  

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.  

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.  

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Discussion 0
Questions 8

Your organization collects credit card information in customer files. You need to implement a policy for your organization’s Google Drive data that prevents the accidental sharing of files that contain credit card numbers with external users. You also need to record any sharing incidents for reporting. What should you do?

Options:

A.  

Create a data loss prevention (DLP) rule that uses the predefined credit card number detector, sets the action to “block external sharing”, and enables the “Log event” option.

B.  

Enable Gmail content compliance, and create a rule to block email attachments containing credit card numbers from being sent to external recipients.

C.  

Implement a third-party data loss prevention solution to integrate with Drive and provide advanced content detection capabilities.

D.  

Configure a data retention policy to automatically delete files containing credit card numbers after a specified period.

Discussion 0
Questions 9

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Options:

A.  

Create a folder inside the shared drive. Share the files with the group by using the share function.

B.  

Create a folder inside the shared drive. Share the folder link with the group.

C.  

In the Admin console, assign Contributor access for the shared drive to each user. Assign Content Manager access for the shared drive to the single user.

D.  

In the Admin console, assign Contributor access for the shared drive to the group. Assign Content Manager access for the shared drive to the single user.

Discussion 0
Questions 10

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

Options:

A.  

Conduct a Vault search to find this email and identify if additional users were affected.

B.  

Conduct a search to find all emails sent by the sender by using the Gmail API.

C.  

Conduct an Email reports search to find this email and all of the email's recipients.

D.  

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Discussion 0
Questions 11

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Options:

A.  

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.  

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.  

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.  

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Discussion 0
Questions 12

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.  

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.  

Assign an Archived User license to all users involved in the project.

C.  

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.  

Export all project related data from Google Workspace and store the data in a separate, secure location.

Discussion 0
Questions 13

You need to grant a specific set of users in your company access to YouTube, and you want to restrict their access to Merchant Center. What should you do?

Options:

A.  

Enable YouTube for all users in the company. Individually restrict access to Merchant Center for specific Groups or organizational units (OUs).

B.  

Create YouTube and Merchant Center as custom web apps. Apply access policies at the Group or organizational unit (OU) level.

C.  

Contact Google Support and request that they enable YouTube access for the specific set of users and restrict their access to Merchant Center.

D.  

Enable access to YouTube at the Group or organizational unit (OU) level for the subset of users. Disable access to Merchant Center.

Discussion 0
Questions 14

A new user at your organization is unable to access Google Meet. You have verified that the user’s account is active and the correct licenses are assigned. You need to resolve the access issue. What should you do?

Options:

A.  

Check the user’s browser settings to ensure that Meet is not blocked.

B.  

Instruct the user to clear their browser’s cache and cookies.

C.  

Restart the user’s computer to refresh their network connection.

D.  

Verify that Meet is enabled as a service for the user’s account in the Admin console.

Discussion 0
Questions 15

Your company provides shared Chromebook workstations for employees to access sensitive company data. You must configure the devices to ensure no sensitive data is stored locally and that browsing data is cleared after each use. What should you do?

Options:

A.  

Force ephemeral mode in Chrome. Disable offline access for sensitive Workspace apps like Docs, Sheets, and Drive.

B.  

Enable the Manage Guest Session functionality, and set the maximum user session length.

C.  

Force ephemeral mode in Chrome. Allow offline access for all Workspace apps with strict expiration times.

D.  

Disable offline access for all Workspace apps. Enable incognito mode for Chrome browsing sessions.

Discussion 0
Questions 16

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.  

Grant the super admin role to a delegate from the security team.

B.  

Create a pre-built reporting role. Assign the role to the security team alias.

C.  

Share the Drive audit log with the security team.

D.  

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Discussion 0
Questions 17

A user accessing sensitive data is experiencing repeated issues with accessing certain files in Google Drive from their laptop by using the Chrome browser. When you contact Google support, the support representative asks to review an HTTP archive file recording (HAR). You need to share logs with Google support without compromising data privacy. What should you do?

Options:

A.  

Open the HAR file in a text editor and delete sensitive information. Upload the HAR file to Google Drive and share the file only with the Google support representative

B.  

Ask the Google support representative for access to a Google Drive folder used by the Google support team. Upload the HAR file.

C.  

Share your screen with the Google support representative so they can view the file without having a copy of the file.

D.  

Upload the HAR file to Google Drive and share the file with the Google support representative.

Discussion 0
Questions 18

An employee with a Workspace Business Plus license at your company is going on a long leave soon. The employee will not need access to their Google Workspace data, but their teammates will need access to the employee’s data. When the employee returns from leave, you will need to restore access to theiraccount, data, emails, and shared documents. You need to preserve the employee’s Workspace data while also minimizing cost while they are on leave. What should you do?

Options:

A.  

Suspend their account in the Admin console.

B.  

Purchase an Archived User license and assign the license to the employee.

C.  

Export the account data by using Takeout, and remove the user license in the Admin console.

D.  

Copy the employee’s emails, and transfer their file ownership to a teammate. Delete the user account.

Discussion 0
Questions 19

Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?

Options:

A.  

Configure the Drive sharing options for the domain to internal only.

B.  

Restrict the Drive sharing options for the domain to allowlisted domains.

C.  

Create a Drive DLP rule, and use the sensitive internal Project name as the detector.

D.  

Turn off the Drive sharing setting from the Team dashboard.

Discussion 0
Questions 20

Your organization is about to conduct its biannual risk assessment. You need to help identify security risks by quickly reviewing all security settings for Gmail, Drive, and Calendar. What should you do?

Options:

A.  

In the reporting section of the Admin console, review the Gmail, Drive, and Calendar reports.

B.  

In the alert center, review all of the alerts.

C.  

In each individual organizational unit (OU), review the security settings.

D.  

In the Google Admin console, review the security health page.

Discussion 0
Questions 21

An employee is leaving your company and has numerous files stored in My Drive. Their manager wants to retain access to these files. You need to offboard the departing employee’s Google Workspace account while ensuring that the manager can still access the files while following Google-recommended practices. What should you do?

Options:

A.  

Use Google Vault to establish a retention policy for the organizational unit (OU) of the departing employee. Assign the Google Archived User license.

B.  

Instruct the departing employee to share their My Drive folder with the manager before leaving. Delete the Google Workspace account on the departing employee’s last day.

C.  

Download the departing employee’s Drive data by using Google Takeout. Upload the data to the manager’s Drive before deleting the departing employee’s Google Workspace account.

D.  

Transfer ownership of the departing employee’s files to the manager during the user deletion process.

Discussion 0
Questions 22

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

Options:

A.  

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.  

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.  

Enable Protect against unauthenticated emails in Gmail Safety.

D.  

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Discussion 0
Questions 23

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

Options:

A.  

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.

B.  

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.

C.  

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.

D.  

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.

Discussion 0
Questions 24

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

Options:

A.  

Create an application by using App Engine. Connect the application to your Workspace environment

B.  

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.  

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.  

Create an automation process by using Apps Script. Run the process through Google Sheets.

Discussion 0
Questions 25

A department at your company wants access to the latest AI-powered features in Google Workspace. You know that Gemini offers advanced capabilities and you need to provide the department with immediate access to Gemini’s features while retaining control over its deployment to ensure that corporate data is not available for human review. What should you do?

Options:

A.  

Enable Gemini for the department’s organizational unit and assign Gemini licenses to users in the department.

B.  

Monitor Gemini adoption through the administrator console and wait for wider user adoption before assigning licenses.

C.  

Enable Gemini for non-licensed users in that department so they have immediate access to the free service.

D.  

Enable Alpha features for the organization and assign Gemini licenses to all users.  

Discussion 0
Questions 26

A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?

Options:

A.  

Purchase and assign Archived User licenses to the former employees.

B.  

Transfer the former employees' files and data to active user accounts. Delete the former employees' Workspace accounts.

C.  

Purchase additional user licenses and suspend the former employees' accounts.

D.  

Move the former employees to their own organizational unit (OU) and disable access to Google services for that OU.

Discussion 0
Questions 27

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

Options:

A.  

Assign the trusted employees as moderators for the relevant Chat spaces.

B.  

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared

C.  

Use the security investigation tool to audit and monitor Chat messages.

D.  

Disable all Chat spaces except those specifically approved by management.

Discussion 0