Google Professional Google Workspace Administrator Exam Practice Questions (P. 2)
- Full Access (151 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
Your organization has enabled spoofing protection against unauthenticated domains. You are receiving complaints that email from multiple partners is not being received. While investigating this issue, you find that emails are all being sent to quarantine due to the configured safety setting. What should be the next step to allow uses to review these emails and reduce the internal complaints while keeping your environment secure?
- AAdd your partner domains IPs to the Inbound Gateway setting.
- BChange the spoofing protection to deliver the emails to spam instead of quarantining them.Most Voted
- CAdd your partner sending IP addresses to an allowlist.
- DChange the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.
Correct Answer:
D
D

Correctly configuring spoofing protections while ensuring that legitimate emails from partners are not lost is a delicate balance. In this scenario, the most efficient approach is to adjust the settings so that emails from known partners, while still flagged, are delivered to inboxes with a clear custom warning. This method helps maintain awareness and caution without completely blocking important communications. This solution also minimizes disruption and complaints from users who might miss critical emails quarantined without notice. Therefore, modifying the spoofing protection as described keeps security tight without impeding essential business interactions.
send
light_mode
delete
Question #7
As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager. As the Workspace Administrator, what should you do to preserve this user's Drive data?
- AIn the user deletion process, select “Transfer” in the data in other apps section and add the manager's email address.Most Voted
- BUse Google Vault to set a retention period on the OU where the users reside.
- CBefore deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.
- DAsk the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.
Correct Answer:
C
C

To ensure that the marketing manager retains exclusive visibility to the documents created by a temporary Google Workspace user, the most suitable approach is indeed to use a shared drive where the marketing manager is the sole person with access. By adding the soon-to-be-deleted user to this shared drive as a contributor and transferring the relevant documents there, we avoid the risk of these documents becoming inaccessible or visible to unauthorized parties following user removal. This method not only takes advantage of Workspace's sharing and permissions functionalities but also efficiently centralizes document management within the targeted department.
send
light_mode
delete
Question #8
As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data. What should you do?
- AOpen Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.Most Voted
- BOpen Admin Console > Security > API Controls > App Access Control > Manage Google Services.
- COpen Admin Console > Security > Less Secure Apps.
- DOpen Admin Console > Security > API Controls > App Access Control > Settings.
Correct Answer:
A
A

To review authorized third-party apps in Google Workspace, go to Admin Console > Security > API Controls > App Access Control, and select Manage Third Party App Access. This specific path provides direct access to managing and reviewing third-party apps’ permissions, ensuring precise control over which apps can interact with your Workspace data. This setting optimizes security by allowing administrators to oversee and adjust app permissions as necessary.
send
light_mode
delete
Question #9
Your organization wants more visibility into actions taken by Google staff related to your data for audit and security reasons. They are specifically interested in understanding the actions performed by Google support staff with regard to the support cases you have opened with Google. What should you do to gain more visibility?
- AFrom Google Admin Panel, go to Audit, and select Access Transparency Logs.Most Voted
- BFrom Google Admin Panel, go to Audit, and select Login Audit Log.
- CFrom Google Admin Panel, go to Audit, and select Rules Audit Log.
- DFrom Google Admin Panel, go to Audit, and select Admin Audit Log.
Correct Answer:
D
D

When you need to check on the actions Google staff are taking, especially regarding support cases, the Access Transparency logs in the Google Admin panel are your go-to. These logs are specifically designed to provide detailed insights into any Google staff activities involving your data, which is exactly what you’re looking for in terms of audit and security. This access provides a clear and detailed trail of interactions, aligning perfectly with the transparency requirements for auditing purposes.
send
light_mode
delete
Question #10
Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail. What should you do to protect your users from future unknown malware in email attachments?
- ARun queries in Security Investigation Tool.
- BTurn on advanced phishing and malware protection.
- CEnable Security Sandbox.Most Voted
- DEnable Gmail confidential mode.
Correct Answer:
B
B

For enhancing protection against sophisticated malware spread via email attachments, activating advanced phishing and malware protection within Google Workspace is a strategic choice. This setting extends beyond Gmail’s standard preventive measures by implementing dynamic, behavior-based checks on incoming messages, distinguishing potential threats, including those hidden in macros. This proactive layer is vital for preventing future malware infections from email-based attacks. Notably, while Security Sandbox also offers robust protection by executing risky attachments in an isolated environment, this specifically targets attachments and doesn't cover other email threat vectors like deceptive links which advanced protection does address.
send
light_mode
delete
All Pages