Google Professional Google Workspace Administrator Exam Practice Questions (P. 3)
- Full Access (151 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Your organization's information security team has asked you to determine and remediate if a user ([email protected]) has shared any sensitive documents outside of your organization. How would you audit access to documents that the user shared inappropriately?
- AOpen Security Investigation Tool-> Drive Log Events. Add two conditions: Visibility Is External, and Actor Is [email protected].Most Voted
- BHave the super administrator use the Security API to audit Drive access.
- CAs a super administrator, change the access on externally shared Drive files manually under [email protected].
- DOpen Security Dashboard-> File Exposure Report-> Export to Sheet, and filter for [email protected].
Correct Answer:
C
C

Indeed, after closely reviewing the question on auditing document access shared outside of the organization, it's evident that Option A is more fitting. This approach leverages the Google Workspace Admin Console's Investigation Tool, efficiently designed to audit and trace inappropriate document sharing via Drive Log Events. Adding conditions like 'Visibility Is External' and 'Actor Is [user]' directly aligns with the necessity to audit rather than change access settings as initially suggested by Option C. The use of this tool is clearly designed for investigative purposes that align with the objectives of your security team's request.
send
light_mode
delete
Question #12
A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam. What steps should the admin take to prevent this behavior in the future?
- AModify the SPF record for your internal domain to include the IPs of the external user's mail servers.
- BUpdate the spam settings in the Admin Console to be less aggressive.
- CAdd the sender's domain to an allowlist via approved senders in the Admin Console.Most Voted
- DInstruct the user to add the senders to their contacts.
Correct Answer:
A
A

When external emails are wrongly labeled as spam, modifying SPF records, a setting that deals with the authentication of outbound emails, won’t resolve the problem. It's more effective to add the sender's domain to an allowlist in the Admin Console. This action, correctly pointed out in the majority of student comments, ensures that emails from these domains bypass the usual spam filtering process, thus directly addressing the issue of these emails being misclassified.
send
light_mode
delete
Question #13
The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in. What else can you do to increase your organization's defense-in-depth strategy?
- AImplement an IP block on the malicious user's IPs under Security Settings in the Admin Console.
- BUse Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.Most Voted
- CEnforce higher complexity passwords by rolling it out to the affected users.
- DUse Mobile device management geo-fencing to prevent malicious actors from using these stolen credentials.
Correct Answer:
B
B

Context-Aware Access in Google Workspace is a strong choice to mitigate the impact of stolen credentials by restricting access based on geographic locations, aligning access permissions strictly with regions your organization operates in. This proactive security measure prevents unauthorized access effectively by denying entry if the user signs in from a restricted location, making it a robust element in a defense-in-depth strategy against credential compromise. This strategic approach leverages the power of geo-restriction, enhancing organizational security.
send
light_mode
delete
Question #14
You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location. How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?
- AConfigure a data region at the top level OU of your organization, and set the value to “Europe”.
- BAdd three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.
- CConfigure a configuration group for European users, and set the data region to “Europe”.Most Voted
- DConfigure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.
Correct Answer:
A
A

While configuring a Google Workspace for ensuring minimal latency and adhering to data storage legal requirements, especially within Europe, it's essential to set the data region effectively at the organization level. Answer choice A, setting the entire organization's data region to “Europe,” is indeed a valid approach when predominantly focusing on compliance and simplifying management. However, it's crucial to note that users outside of Europe might face increased latency. Always evaluate the impact on end-user experience against the compliance needs and organizational structure simplifications this setup offers. This strategy aligns with compliance priorities while acknowledging potential drawbacks in global accessibility and performance.
send
light_mode
delete
Question #15
As a team manager, you need to create a vacation calendar that your team members can use to share their time off. You want to use the calendar to visualize online status for team members, especially if multiple individuals are on vacation What should you do to create this calendar?
- ARequest the creation of a calendar resource, configure the calendar to “Auto-accept invitations that do not conflict,” and give your team “See all event details” access.
- BCreate a secondary calendar under your account, and give your team “Make changes to events” access.Most Voted
- CRequest the creation of a calendar resource, configure the calendar to “Automatically add all invitations to this calendar,” and give your team “See only free/busy” access.
- DCreate a secondary calendar under your account, and give your team “See only free/busy” access.
Correct Answer:
C
C

The correct answer is C, and though there's a strong case made for option B, based on the question intent, a Calendar Resource fittingly serves the purpose here. When creating a vacation calendar aimed at monitoring members' availability without requiring them to make alterations directly (noting the absence of specified need for editing access by the team), setting it to “Automatically add all invitations to this calendar” ensures all vacation times are easily visible, while restricting visibility to "See only free/busy" upholds privacy regarding specific plans. This setting admirably harmonizes these requirements, thus making C the most fitting choice.
send
light_mode
delete
All Pages