Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Google Google-Workspace-Administrator Associate Google Workspace Administrator Exam Practice Test

Page: 1 / 7
Total 73 questions

Associate Google Workspace Administrator Questions and Answers

Question 1

Your organization allows employees to use their personal devices for work purposes. You want to ensure these devices follow the company’s security policies. You need to choose a mobile management solution that provides minimal passcode enforcement and allows for an admin to remotely wipe a user’s account from the device. You also want to avoid having to install agents on employees’ personal devices. What should you do?

Options:

A.

Implement Google’s advanced management on mobile devices.

B.

Implement Google’s basic management on mobile devices.

C.

Enforce a strong password policy, and enforce the password policy at the next sign-in.

D.

Deploy a third-party mobile device management (MDM) solution.

Question 2

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.

What should you do?

Options:

A.

Export the resource list to a CSV file, make the changes, and re-import the updated file.

B.

Edit each resource in the Google Admin console.

C.

Add the modified rooms as new resources. Tell employees not to use old rooms.

D.

Delete the existing resources and recreate the resources with the updated information.

Question 3

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Question 4

You are configuring Google Chat for your organization. Using the Adin console, you want to enable employees to view their chat history by default and allow employees to turn off chat history. What should you do?

Options:

A.

Configure Google Vault to retain all Chat messages, and exclude organizational units (OUs) with users who want to turn Chat history off.

B.

Set the space history setting to OFF and chat history to ON.

C.

Set the top-level default conversation history setting to ON and allow users to change their history setting.

D.

Set the top-level default conversation history settings to OFF and allow users in each organizational unit (OU) to change their history setting.

Question 5

You manage Chrome Enterprise browsers for your large organization. You want to ensure that specific extensions are automatically installed on all managed Chrome Enterprise browsers. What should you do?

Options:

A.

Allowlist the specific Chrome browser extensions.

B.

Configure a script to deploy the extensions upon user login.

C.

Publish the extensions in the Chrome Web Store.

D.

Force-install the extensions through Chrome browser policies.

Question 6

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

Options:

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Question 7

An employee using a Workspace Enterprise Standard license was terminated from your organization. You need to ensure that the former employee no longer has access to their Workspace account and preserve access to the former employee’s documents for the manager and the team.

You want to minimize license cost. What should you do?

Options:

A.

Delete the former employee's Workspace account.

B.

Suspend former employee's Workspace account.

C.

Reset the password of the former employee and keep their Workspace license active.

D.

Switch the license type of the former employee's Workspace account to an Archived User license.

Question 8

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Question 9

A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?

Options:

A.

Purchase and assign Archived User licenses to the former employees.

B.

Transfer the former employees' files and data to active user accounts. Delete the former employees' Workspace accounts.

C.

Purchase additional user licenses and suspend the former employees' accounts.

D.

Move the former employees to their own organizational unit(OU) and disable access to Google services for that OU.

Question 10

Per regulatory requirements, your company is required to keep the data of employees located in Germany within Europe and the data of employees located in the US within the US. The employees in Germany are in a separate organizational unit (OU) than employees in the US. You need to ensure that where employee data is stored is in compliance with the location regulations.

What should you do?

Options:

A.

Instruct employees to use Drive for desktop to keep documents on their corporate computers.

B.

Create two Groups. Assign employees into the Germany or US Group based on their location. Use Google Drive trust rules to prevent sharing between the Groups.

C.

Navigate to the Data Regions function in the Admin console. Select the Europe region for employees in Germany, and select the US region for US employees.

D.

Navigate to the Data Regions function in the Admin console. Select 'No preference.'

Question 11

Your company wants to enable single sign-on (SSO) for its employees to access a newly acquired cloud-based marketing platform. The marketing platform vendor has confirmed SAML 2.0 compatibility and provided the necessary metadata. You need to streamline user access and centralize authentication through Google Workspace. What should you do?

Options:

A.

Request an API key from the marketing platform vendor for SAML integration.

B.

Enable two-factor authentication for all users to enhance security before implementing SSO.

C.

Instruct employees to log in to the marketing platform using the Sign In with Google functionality.

D.

Create a new SAML application in the Google Admin console.

Question 12

An executive at your organization asked you to give their executive administrator access to their Workspace account. You need to ensure that this executive administrator can manage emails in the executive’s account. You need to maintain security and privacy of the executive’s account. What should you do?

Options:

A.

Assist the executive in setting up email forwarding to their executive administrator.

B.

Instruct the executive to share their password with their executive administrator.

C.

Create a Google Group, and add all executive administrators. Enable delegated access to the Group.

D.

Grant delegated access to the executive's Gmail account, and assign access to their executive administrator in Gmail settings.

Question 13

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

Options:

A.

Adjust the organization’s mail content compliance settings in the Admin console.

B.

Advise users to individually allowlist senders.

C.

Disable spam filtering for all users.

D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Question 14

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

Options:

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Question 15

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Options:

A.

Create a folder inside the shared drive. Share the files with the group by using the share function.

B.

Create a folder inside the shared drive. Share the folder link with the group.

C.

In the Admin console, assign Contributor access for the shared drive to each user. Assign Content Manager access for the shared drive to the single user.

D.

In the Admin console, assign Contributor access for the shared drive to the group. Assign Content Manager access for the shared drive to the single user.

Question 16

The current data storage limit for the sales organizational unit (OU) at your company is set at 10GB per user. A subset of sales representatives in that OU need 100GB of storage across shared services. You need to increase the storage for only the subset of sales representatives by using the least disruptive approach and the fewest configuration steps. What should you do?

Options:

A.

Move the subset of users to a sub-OU, and assign a 100GB storage limit to that sub-OU.

B.

Instruct the subset of users to store their documents in a Shared Drive with a 100GB limit.

C.

Change the storage limit of the sales OU to 100GB.

D.

Create a configuration group, and add the subset of users to that group. Set the group storage limit to 100GB.

Question 17

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

Options:

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Question 18

Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?

Options:

A.

Add the Trusted Workspace domain names in the Stream dialog box.

B.

Turn off live streaming to Youtube.

C.

Add participants to an organizational unit (OU). Turn on live streaming.

D.

Turn on in-house live streaming. Invite users from affiliated domains.

Question 19

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Options:

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Question 20

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external Google Groups with their Google Workspace accounts without interrupting internal group usage. What should you do?

Options:

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.

B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.

C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.

D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.

Question 21

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

Options:

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Page: 1 / 7
Total 73 questions