Exam Code | Google-Workspace-Administrator |
Exam Name | Google Cloud Certified - Professional Google Workspace Administrator |
Questions | 199 Questions Answers With Explanation |
Update Date | November 08,2024 |
Price |
Was : |
Are you ready to take your career to the next level with Google Cloud Certified - Professional Google Workspace Administrator? At Prep4Certs, we're dedicated to helping you achieve your goals by providing high-quality Google-Workspace-Administrator Dumps and resources for a wide range of certification exams.
At Prep4Certs, we're committed to your success in the Google Google-Workspace-Administrator exam. Our comprehensive study materials and resources are designed to equip you with the knowledge and skills needed to ace the exam with confidence:
Start Your Certification Journey Today
Whether you're looking to advance your career, expand your skill set, or pursue new opportunities, Prep4Certs is here to support you on your certification journey. Explore our comprehensive study materials, take your exam preparation to the next level, and unlock new possibilities for professional growth and success.
Ready to achieve your certification goals? Begin your journey with Prep4Certs today!
Your organization has implemented Single Sign-On (SSO) for the multiple cloud-based services it utilizes. During authentication, one service indicates that access to the SSO provider cannot be accessed due to invalid information. What should you do?
A. Verify the NameID Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
B. Verify the Audience Element in the SAML Response matches the Assertion Consumer Service (ACS) URL.
C. Verify the Subject attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
D. Verify the Recipient attribute in the SAML Response matches the Assertion Consumer Service (ACS) URL.
Your company moved to Google Workspace last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session. How should you accomplish this?
A. In the Admin Console, select the devices in Meeting Room Hardware, select Call, and
Enter the meeting code.
B. Room participants will need to start the meeting from the remote in the room.
C. By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.
D. Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.
The application development team has come to you requesting that a new, internal, domain-owned Google Workspace app be allowed to access Google Drive APIs. You are currently restricting access to all APIs using approved whitelists, per security policy. You need to grant access for this app. What should you do?
A. Enable all API access for Google Drive.
B. Enable “trust domain owned apps” setting.
C. Add OAuth Client ID to Google Drive Trusted List.
D. Whitelist the app in the Google Workspace Marketplace.
The executive team for your company has an extended retention policy of two years in place so that they have access to email for a longer period of time. Your COO has found this useful in the past but when they went to find an email from last year to prove details of a contract in dispute, they were unable to find it. itis no longer in the Trash. They have requested that you recover it. What should you do?
A. Using Vault, perform a search for the email and export the content to a standard format to provide for investigation.
B. Using the Message ID, contact Google Google Workspace support to recover the email, then import with Google Workspace Migration for Microsoft Outlook.
C. Using the Vault Audit log, perform a search for the email, export the results. then import with Google Workspace Migration for Microsoft Outlook.
Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing? What should you do?
A. Create a report using the OAuth Token Audit Activity logs.
B. Create a report using the Calendar Audit Activity logs.
C. Create a report using the Drive Audit Activity logs.
D. Create a reporting using the API Permissions logs for Installed Apps.
Your company is in the process of deploying Google Drive Enterprise for your sales organization. You have discovered that there are many unmanaged accounts across your domain. Your security team wants to manage these accounts moving forward. What should you do?
A. Disable access to all “Other Services” in the Google Workspace Admin Console.
B. Use the Transfer Tool for unmanaged accounts to invite users into the domain.
C. Use the Data Migration Service to transfer the data to a managed account.
D. Open a support ticket to have Google transfer unmanaged accounts into your domain.
Your organization has recently gone Google, but you are not syncing Groups yet. You plan to sync all of your Active Directory group objects to Google Groups with a single GCDS configuration. Which scenario could require an alternative deployment strategy?
A. Some of your Active Directory groups have sensitive group membership.
B. Some of the Active Directory groups do not have owners.
C. Some of the Active Directory groups have members external to organization.
D. Some of the Active Directory groups do not have email addresses.
A user does not follow their usual sign-in pattern and signs in from an unusual location. What type of alert is triggered by this event?
A. Suspicious mobile activity alert.
B. Suspicious login activity alert.
C. Leaked password alert.
D. User sign-in alert.
Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled. What two actions should you take to support the chief security officer's request? (Choose two.)
A. Review who has viewed files using the Google Drive Activity Dashboard.
B. Create an alert from Drive Audit reports to notify of external file sharing.
C. Review total external sharing in the Aggregate Reports section.
D. Create a custom Dashboard for external sharing in the Security Investigation Tool.
E. Automatically block external sharing using DLP rules.
In the years prior to your organization moving to Google Workspace, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on Google Workspace.) You were able to address active employees’ use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account. What should you do?
A. Contact Google Enterprise Support to provide a list of all accounts on your domain(s)
that access non-Google Workspace Google services and have them blocked.
B. Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
C. Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
D. Provision former user accounts with Cloud Identity licenses, generate a new Google
password, and place them in an OU with all Google Workspace and Other Google Services
disabled.