Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Google Cloud Certified - Professional Google Workspace Administrator Question and Answers

Google Cloud Certified - Professional Google Workspace Administrator

Last Update May 3, 2024
Total Questions : 160

We are offering FREE Google-Workspace-Administrator Google exam questions. All you do is to just go and sign up. Give your details, prepare Google-Workspace-Administrator free exam questions and then go for complete pool of Google Cloud Certified - Professional Google Workspace Administrator test questions that will help you more.

Google-Workspace-Administrator pdf

Google-Workspace-Administrator PDF

$35  $99.99
Google-Workspace-Administrator Engine

Google-Workspace-Administrator Testing Engine

$42  $119.99
Google-Workspace-Administrator PDF + Engine

Google-Workspace-Administrator PDF + Testing Engine

$56  $159.99
Questions 1

You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It's important that the same users cannot remove or delete files. How can you configure access for these users to match the team's request?

Options:

A.  

Set up the shared drive, and add the users as Content Managers of the drive.

B.  

Set up the shared drive, and add the users as editors of the drive.

C.  

Set up the shared drive, and add the users as Contributors of the drive.

D.  

Set up the shared drive, and add the users as Managers of the drive.

Discussion 0
Questions 2

Four weeks ago. you exported data from Google Vault and emailed the PST export file to your legal admin. They accidentally deleted the PST file and need it sent again. What steps should you take to re-send the PST file to the legal admin?

Options:

A.  

Return to the Google Vault export page, and download the ZIP file again.

B.  

Return to the Email Log Search page, and download the PST file again.

C.  

Ask the legal admin to return to Google Vault to download the PST file again.

D.  

Repeat the original search for the original timeframe, and export the data again.

Discussion 0
Questions 3

On which two platforms can you push WiFi connection information with Google Workspace? (Choose two.)

Options:

A.  

Mac OS

B.  

Windows

C.  

Chrome OS

D.  

iOS

E.  

Linux

Discussion 0
Questions 4

Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward.

What should you do?

Options:

A.  

Disable access to all “Other Services” in the Google Workspace Admin Console.

B.  

Use the Transfer Tool for unmanaged accounts to invite users into the domain.

C.  

Use the Data Migration Service to transfer the data to a managed account.

D.  

Open a support ticket to have Google transfer unmanaged accounts into your domain.

Discussion 0
Questions 5

Your company has acquired a new company in Japan and wants to add all employees of the acquisition to your existing Google Workspace domain. The new company will retain its original domain for email addresses and, due to the very sensitive nature of its work, the new employees should not be visible in the global directory. However, they should be visible within each company's separate directory. What should you do to meet these requirements?

Options:

A.  

Create a new Google Workspace domain isolated from the existing one, and create users in the new domain instead.

B.  

Under Directory Settings > Contact sharing, disable the contact sharing option and wait for 24 hours to allow the settings to propagate before creating the new employee accounts.

C.  

Redesign your OU organization to have 2 child OUs for each company directly under the root. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the OU.

D.  

Create one dynamic group for each company based on a custom attribute defining the company. In Directory Settings > Visibility Settings, define custom directories for each company, and set up Visibility according to the dynamic group.

Discussion 0
Questions 6

Your company (your-company.com) just acquired a new business (new-company.com) that is running their email on-premises. It is close to their peak season, so any major changes need to be postponed. However, you need to ensure that the users at the new business can receive email addressed to them using your- company.com into their on-premises email server. You need to set up an email routing policy to accomplish this.

What steps should you take?

Options:

A.  

Set up an Outbound Mail Gateway to route all outbound email to the on-premises server.

B.  

Set up accounts for the new employees, and use mail forwarding rules to send to the on-premises server.

C.  

Set up an Inbound Mail Gateway to reroute all inbound email to the on-premises server.

D.  

Set up a Default route with split delivery to route email to the on-premises server.

Discussion 0
Questions 7

Your organization is in the process of deploying Google Drive for desktop so that your users can access Drive files directly from their desktops. For security reasons, you want to restrict Drive for desktop to only company-owned devices. What two steps should you take from the admin panel to restrict Drive for desktop to only company-owned devices?

Choose 2 answers

Options:

A.  

Create a company-owned device inventory using an asset tag.

B.  

Devices > Endpoints > Add a filter-> Management Type > Drive for desktop > Apply

C.  

Apps > Google Workspace > Drive and Docs > Features and Applications > Google Drive for Desktop > Only Allow Google Drive for desktop on authorized devices

D.  

Install the Google Endpoint Verification extension on machines using Drive for Desktop.

E.  

Create a company-owned device inventory using serial numbers of devices.

Discussion 0
Questions 8

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs. How can this be accomplished?

Options:

A.  

Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”

B.  

Admin.google.com > Reporting > Reports > Apps Reports > Gmail

C.  

chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com

D.  

Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Discussion 0
Questions 9

Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.

What should you do?

Options:

A.  

Enable additional security verification via email.

B.  

Enable authentication via the Google Authenticator.

C.  

Deploy browser or device certificates via Google Workspace.

D.  

Configure USB Yubikeys for all users.

Discussion 0
Questions 10

Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.

What should you do?

Options:

A.  

Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.

B.  

Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.

C.  

Create a blocked senders list at the Sales OU that contains the mass email sender addresses.

D.  

Create an approved senders list at the Market Research OU that contains the mass email sender addresses.

Discussion 0
Questions 11

You need to protect your users from untrusted senders sending encrypted attachments via email. You must ensure that these messages are not delivered to users' mailboxes. What step should be taken?

Options:

A.  

Use the security center to remove the messages from users' mailboxes

B.  

Use Google Vault to remove these messages from users mailboxes.

C.  

Enable a safety rule to send these types of messages to spam.

D.  

Enable a safety rule to send these types of messages to a quarantine.

Discussion 0
Questions 12

Your organization is planning to remove any dependencies on Active Directory (AD) from all Cloud applications they are using You are currently using Google Cloud Directory Sync (GCDS) with on-premises AD as a source to provision user accounts in Google Workspace. Your organization is also using a software-as-a-service (SaaS) human resources information system (HRIS) that offers integration via CSV export and Open API standard.

Additional requirements for the solution include:

• It should not require a subscription to any additional third-party service.

• The process must be automated from beginning to end.

You are tasked with the design and implementation of a solution to address user provisioning with these requirements.

What solution should you implement?

Options:

A.  

Set up Azure AD and federate on-premises AD with it. Provision user accounts from Azure AD with the Google-recommended process.

B.  

Modify the GCDS configuration to use the HRIS application as the data source and complete any necessary adjustments

C.  

Export HRIS data to a CSV file every day. and build a solution to define the delta with the previous day;

import the result as a CSV file via the Admin console.

D.  

Build an application that will fetch updated data from the HRIS system via Open API. and then update

Google Workspace with the Directory API accordingly.

Discussion 0
Questions 13

Your organization uses a third-party product to filter mail before it arrives at your Workspace Domain. How should you configure Gmail to ensure that inbound messages are not seen as a spam attack due to the volume of mail being received from this product?

Options:

A.  

Add the product's IP addresses as an approved sender.

B.  

Allowlist the IP addresses of the third-party filtering product.

C.  

Add the product's IP addresses to your organization's SPF record.

D.  

List the IP addresses of the product as an Inbound Gateway.

Discussion 0
Questions 14

What action should be taken to configure alerting related to phishing attacks?

Options:

A.  

Set up a Token audit log event alert.

B.  

Set up an Admin audit log event alert.

C.  

Set up an email settings changed alert.

D.  

Set up a suspicious login event alert.

Discussion 0
Questions 15

You are supporting an investigation that is being conducted by your litigation team. The current default retention policy for mail is 180 days, and there are no custom mail retention policies in place. The litigation team has identified a user who is central to the investigation, and they want to investigate the mail data related to this user without the user’s awareness.

What two actions should you take? (Choose two.)

Options:

A.  

Move the user to their own Organization Unit, and set a custom retention policy

B.  

Create a matter using Google Vault, and share the matter with the litigation team members.

C.  

Create a hold on the user’s mailbox in Google Vault

D.  

Reset the user's password, and share the new password with the litigation team.

E.  

Copy the user's data to a secondary account.

Discussion 0
Questions 16

The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it.

What should you do?

Options:

A.  

Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.

B.  

Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.

C.  

Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.

Discussion 0
Questions 17

All Human Resources employees at your company are members of the “HR Department” Team Drive. The HR Director wants to enact a new policy to restrict access to the “Employee Compensation” subfolder stored on that Team Drive to a small subset of the team.

What should you do?

Options:

A.  

Use the Drive API to modify the permissions of the Employee Compensation subfolder.

B.  

Use the Drive API to modify the permissions of the individual files contained within the subfolder.

C.  

Move the contents of the subfolder to a new Team Drive with only the relevant team members.

D.  

Move the subfolder to the HR Director's MyDrive and share it with the relevant team members.

Discussion 0
Questions 18

Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date. What corrective action should you take to allow the users to sign in again?

Options:

A.  

Disable 2-Step Verification per organizational unit so the affected users can sign in.

B.  

Move the affected users into the exception group temporarily so they can set up 2-Step Verification, and then remove them from the exception group after successful sign-in is confirmed.

C.  

Disable 2-Step Verification organization-wide so all users can successfully sign in.

D.  

Move the affected users into the exception group permanently so they do not have to use 2-Step Verification going forward.

Discussion 0
Questions 19

A retail company has high employee turnover due to the cyclical nature in the consumer space. The increase in leaked confidential content has created the need for a specific administrative role to monitor ongoing employee security investigations. What step should you take to increase the visibility of such investigations?

Options:

A.  

Assign the ‘Services Admin’ role to an administrator with ‘Super Admin’ privileges.

B.  

Create a ‘Custom Role’ and add all the Google Vault privileges for a new administrator.

C.  

Validate that the new administrator has access to Google Vault.

D.  

Create a ‘Custom Role’ and add the ability to manage Google Vault matters, holds, searches, and exports.

Discussion 0
Questions 20

Your company has sales offices in Madrid, Tokyo, London, and New York. The outbound email for those offices needs to include the sales person's signature and a compliance footer. The compliance footer needs to say “Should you no longer wish to receive emails about this offer, please reply with UNSUBSCRIBE.” You are responsible for making sure that users cannot remove the footer.

What should you do?

Options:

A.  

Send an email to each sales person with the instructions on how to add the footer to their Signature.

B.  

Ensure that each sales team is in their own OU, and configure the Append Footer with the signature and footer content translated for each locale.

C.  

Ensure that each sales team is in their own OU, and configure the Append Footer with footer content.

D.  

Ensure that each sales team is in their own OU, and configure the Append Footer with the footer content translated for each locale.

Discussion 0
Questions 21

Your business partner requests that a new custom cloud application be set up to log in without having separate credentials.

What is your business partner required to provide in order to proceed?

Options:

A.  

Service provider logout URL

B.  

Service provider ACS URL

C.  

Identity Provider URL

D.  

Service provider certificate

Discussion 0
Questions 22

You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no other users are experiencing issues signing in. What could be causing the sign-in issue?

Options:

A.  

The SAML assertion provided by the third-party IDP is presenting a username that conflicts with the current username configured in Google Workspace.

B.  

The user's Google password was changed administratively, which is causing a sign-in failure.

C.  

The issued certificate for that user has been revoked and must be updated before the user can have another successful sign in.

D.  

The SAML assertion is providing the user's previous password attached to their old username.

Discussion 0
Questions 23

Your company moved to Google Workspace last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session.

How should you accomplish this?

Options:

A.  

In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.

B.  

Room participants will need to start the meeting from the remote in the room.

C.  

By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.

D.  

Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.

Discussion 0
Questions 24

A user does not follow their usual sign-in pattern and signs in from an unusual location.

What type of alert is triggered by this event?

Options:

A.  

Suspicious mobile activity alert.

B.  

Suspicious login activity alert.

C.  

Leaked password alert.

D.  

User sign-in alert.

Discussion 0
Questions 25

A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network.

Where should you enable this in the Chrome management settings?

Options:

A.  

Randomly scatter auto-updates.

B.  

Update over cellular.

C.  

Disable Auto update.

D.  

Throttle the bandwidth.

Discussion 0
Questions 26

Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.

What should you do?

Options:

A.  

Educate users on creating personal contacts for the Partner Employees.

B.  

Add a secondary domain for the Partner Company and create user entries for each Partner user.

C.  

Create shared contacts in the Directory using the Directory API.

D.  

Create shared contacts in the Directory using the Domain Shared Contacts API.

Discussion 0
Questions 27

Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?

What should you do?

Options:

A.  

Create a report using the OAuth Token Audit Activity logs.

B.  

Create a report using the Calendar Audit Activity logs.

C.  

Create a report using the Drive Audit Activity logs.

D.  

Create a reporting using the API Permissions logs for Installed Apps.

Discussion 0
Questions 28

A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam. What steps should the admin take to prevent this behavior in the future?

Options:

A.  

Modify the SPF record for your internal domain to include the IPs of the external user's mail servers.

B.  

Update the spam settings in the Admin Console to be less aggressive.

C.  

Add the sender's domain to an allowlist via approved senders in the Admin Console.

D.  

Instruct the user to add the senders to their contacts.

Discussion 0
Questions 29

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.

What should you do?

Options:

A.  

Run the Transfer Tool for Unmanaged users.

B.  

Use a Google Form to survey the Marketing department users.

C.  

Assure the VP that there is no action required to configure Google Workspace.

D.  

Contact Google Enterprise Support to identify affected users.

Discussion 0
Questions 30

You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location. How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?

Options:

A.  

Configure a data region at the top level OU of your organization, and set the value to “Europe”.

B.  

Add three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.

C.  

Configure a configuration group for European users, and set the data region to “Europe”.

D.  

Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.

Discussion 0
Questions 31

Your company is using Google Workspace Enterprise Standard. They have 200 meeting rooms defined for the main building and used daily by the 12,000 employees. Users are complaining they have difficulties finding a room available when searching within Google Calendar, even if several rooms are available (no one attending meetings in these rooms at that time). You have been asked to find a solution while minimizing the operational effort and avoiding any new expenses due to budget constraints. What should you do?

Options:

A.  

Implement a third-party solution that will detect presence in the room and release it if nobody appears after a few minutes.

B.  

Create a Google App Script that will inspect each room calendar for the next 12 hours, check attendees status, and send the room administrator an alert email for releasing the room if all attendees have declined but the room has not.

C.  

Set the option "Allow calendar-based room release" for all targeted rooms.

D.  

Upgrade to Google Workspace Enterprise Plus edition to benefit from additional features for automated machine learning (ML) based resources management.

Discussion 0
Questions 32

The human resources (HR) team needs a centralized place to share key documents with the entire organization while protecting confidential documents and mitigating the risk of losing documents when someone leaves. These documents must be editable by the HR team members. What is the best way to set this up?

Options:

A.  

Have the HR lead create a folder in their MyDrive for the non-confidential files, give edit access to the HR team, and give view access to the organization.

B.  

Create a shared drive for the non-confidential files, give the HR team manager access, and give contributor access to the entire organization.

C.  

Create a shared drive for non-confidential files, give the HR team content manager access, and give view access to the organization.

D.  

Create a shared drive for all files, give the HR team content manager access, and give view access to the organization.

Discussion 0
Questions 33

As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data. What should you do?

Options:

A.  

Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.

B.  

Open Admin Console > Security > API Controls > App Access Control > Manage Google Services.

C.  

Open Admin Console > Security > Less Secure Apps.

D.  

Open Admin Console > Security > API Controls > App Access Control > Settings.

Discussion 0
Questions 34

Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes.

What action should you take?

Options:

A.  

Company Profile > Profile > New User Features > Enable “Scheduled Release”

B.  

Apps > Google Workspace > Gmail > Uncheck “Enable Gmail Labs for my users”

C.  

Company Profile > Profile > New User Features > Enable “Rapid Release”

D.  

Device Management > Chrome > Device Settings > Stop auto-updates

Discussion 0
Questions 35

You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly.

What should you do?

Options:

A.  

Use the bulk upload with CSV feature in the Google Workspace Admin panel to update all Groups.

B.  

Update your configuration file and resync mailing lists with Google Cloud Directory Sync.

C.  

Create and assign a custom admin role for all group owners so they can update settings.

D.  

Use the Groups Settings API to update Google Groups with desired settings.

Discussion 0
Questions 36

A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved. As the administrator, how can you fulfill the legal team's request?

Options:

A.  

Use Security Investigation Tool to Search Google Drive events for all of the user's documents, and use Google Admin > Reports > Email Log Search to find their emails.

B.  

Search Google Drive for all of the user’s documents, and ask them to forward all of their emails.

C.  

Use the Gmail API and Google Drive API to automatically collect and export data.

D.  

Utilize Google Vault to hold, search, and export data of interest.

Discussion 0
Questions 37

Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration.

Which scenario could require an alternative deployment strategy?

Options:

A.  

Some of your Active Directory groups have sensitive group membership.

B.  

Some of the Active Directory groups do not have owners.

C.  

Some of the Active Directory groups have members external to organization.

D.  

Some of the Active Directory groups do not have email addresses.

Discussion 0
Questions 38

You have enabled Automatic Room Replacement for your calendar resources, but it is not working for any instances of a conflict booking. What could be the issue?

Options:

A.  

Automatic Room Replacement does not work on recurring events.

B.  

This feature requires calendar event owners to have the Buildings and resources administrator privilege

C.  

The calendar resources do not have the Resource Category configured as CONFERENCE_ROOM

D.  

The events have more than 20 attendees.

Discussion 0
Questions 39

Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.

What should you do?

Options:

A.  

Configure a Google Group as an email list.

B.  

Delegate email access to department employees.

C.  

Configure a Google Group as a collaborative inbox.

D.  

Configure a Google Group, and set the Access Level to Announcement Only.

Discussion 0
Questions 40

Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing “Secret Project 123.”

What steps should you take to satisfy this request?

Options:

A.  

Create a Matter and a Hold. Set the Hold to Gmail, set it to the top level Organization, and set the search terms to “secret project 123.” Create a second Hold. Set the second Hold to Gmail, set it to Accounts, and enter: user1 @your-company.com, user2@your-company.com. Save.

B.  

Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to: (secret project 123). Save.

C.  

Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and enter: user1@your- company.com AND user2@your-company.com. Set the search terms to: secret AND project AND 123. Save.

D.  

Create a Matter and a Hold. Set the Hold to Gmail, set it to Accounts, and set the usernames to: user1@your-company.com, user2@your-company. Set the search terms to secret OR project OR 123. Save.

Discussion 0
Questions 41

A subset of users from the finance and human resources (HR) teams need to share documents with an external vendor. However, external content sharing is prohibited for the entire finance team. What would be the most secure method to enable external sharing for this set of users?

Options:

A.  

Download and attach the documents to a Gmail message, and send them to the external vendor.

B.  

Move all users from the finance org unit to the HR org unit.

C.  

Enable ‘Visitor Sharing’ for the entire finance org unit.

D.  

Create a group with the finance and HR users who need to share externally.

Discussion 0
Questions 42

In the years prior to your organization moving to Google Workspace, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on Google Workspace.) You were able to address active employees’ use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account.

What should you do?

Options:

A.  

Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-Google Workspace Google services and have them blocked.

B.  

Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.

C.  

Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.

D.  

Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all Google Workspace and Other Google Services disabled.

Discussion 0
Questions 43

You act as the Google Workspace Administrator for a company that has just acquired another organization. The acquired company will be migrated into your Workspace environment in 6 months. Management has asked you to ensure that the Google Workspace users you currently manage can efficiently access rich contact information in Workspace for all users. This needs to occur before the migration, and optimally without additional expenditure. What step do you take to populate contact information for all users?

Options:

A.  

Bulk-upload the contact information for these users via CSV into the Google Directory.

B.  

Use the Domain Shared Contacts API to upload contact information for the acquired company's users.

C.  

Provision and license Google Workspace accounts for the acquired company's users because they will need accounts in the future.

D.  

Prepare an uploadable file to be distributed to your end users that allows them to add the acquired company’s user contact information to their personal contacts.

Discussion 0
Questions 44

A user has traveled overseas for an extended trip to meet with several vendors. The user has reported that important draft emails have not been saved in Gmail, which is affecting their productivity. They have been constantly moving between hotels, vendor offices, and airport lounges.

You have been tasked with troubleshooting the issue remotely. Your first priority is diagnosing and preventing this from happening again, and your second priority is recovering the drafts if possible. Due to time zone differences, and the user's busy meeting schedule, you have only been able to arrange a brief Hangouts Meet with the user to gather any required troubleshooting inputs.

What two actions should be taken on this call with the user? (Choose two.)

Options:

A.  

Ask the user to send an email to you so you can check the headers.

B.  

Record a HAR file of the user composing a new email.

C.  

Take screenshots of the user’s screen when composing an email.

D.  

Use the Email log search in the Admin panel.

E.  

Check the Users > App Users Activity report.

Discussion 0
Questions 45

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

Options:

A.  

Extend the legal hold on the user's email data.

B.  

Move project files to a Team Drive or transfer ownership.

C.  

Rename the account to the new user starting next week.

D.  

Delete the account, freeing up a Google Workspace License.

E.  

Assign the terminated user account an Archive User license.

Discussion 0