Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Google > Workspace Administrator > Google-Workspace-Administrator

Google-Workspace-Administrator Associate Google Workspace Administrator Question and Answers

Question # 4

You notice an increase in support cases related to Chrome browser within your organization. You suspect a potential outage or service disruption with Chrome browser. You need to determine whether any information has been released about the issue and if there are any projected timelines for its resolution. What should you do first?

A.

Use the Help Assistant within the Google Admin console to identify if there was a recent outage.

B.

Collect a HAR file, and use the Google Admin Toolbox to identify potential failures.

C.

Review the Google Workspace Status Dashboard.

D.

Log a case with Chrome Enterprise support.

Full Access
Question # 5

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Full Access
Question # 6

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

A.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

B.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

C.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

D.

Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Full Access
Question # 7

The current data storage limit for the sales organizational unit (OU) at your company is set at 10GB per user. A subset of sales representatives in that OU need 100GB of storage across shared services. You need to increase the storage for only the subset of sales representatives by using the least disruptive approach and the fewest configuration steps. What should you do?

A.

Move the subset of users to a sub-OU, and assign a 100GB storage limit to that sub-OU.

B.

Instruct the subset of users to store their documents in a Shared Drive with a 100GB limit.

C.

Change the storage limit of the sales OU to 100GB.

D.

Create a configuration group, and add the subset of users to that group. Set the group storage limit to 100GB.

Full Access
Question # 8

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Full Access
Question # 9

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Full Access
Question # 10

A department at your company wants access to the latest AI-powered features in Google Workspace. You know that Gemini offers advanced capabilities and you need to provide the department with immediate access to Gemini’s features while retaining control over its deployment to ensure that corporate data is not available for human review. What should you do?

A.

Enable Gemini for the department’s organizational unit and assign Gemini licenses to users in the department.

B.

Monitor Gemini adoption through the administrator console and wait for wider user adoption before assigning licenses.

C.

Enable Gemini for non-licensed users in that department so they have immediate access to the free service.

D.

Enable Alpha features for the organization and assign Gemini licenses to all users.  

Full Access
Question # 11

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Full Access
Question # 12

Your organization needs an approval application for purchases where a user can enter information on the purchase required and then submit it for management approval. You need to suggest a solution to create the application that must be available on both the web and mobile devices. Your organization does not have software developers or the budget to hire a third party. What should you do?

A.

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

B.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

C.

Suggest the organization use AppSheet to create the application.

D.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

Full Access
Question # 13

Your company has recently migrated from an on-premises email solution to Google Workspace. You have successfully added and verified the new primary domain. However, you also want to continue receiving emails sent to your former on-premises email server for a transitional period. You need to ensure that emails sent to your former domain are still delivered to your on-premises server, even though your primary email system is now Google Workspace. What should you do?

A.

Configure MX records for the former domain to point to your on-premises email servers.

B.

Add the former domain as a secondary domain in your Google Workspace settings and verify the domain.

C.

Adjust the TTL (Time-to-Live) for the former domain to ensure a smooth transition.

D.

Add the former domain as a domain alias for the primary domain.

Full Access
Question # 14

A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?

A.

Purchase and assign Archived User licenses to the former employees.

B.

Transfer the former employees' files and data to active user accounts. Delete the former employees' Workspace accounts.

C.

Purchase additional user licenses and suspend the former employees' accounts.

D.

Move the former employees to their own organizational unit (OU) and disable access to Google services for that OU.

Full Access
Question # 15

An employee with a Workspace Business Plus license at your company is going on a long leave soon. The employee will not need access to their Google Workspace data, but their teammates will need access to the employee’s data. When the employee returns from leave, you will need to restore access to theiraccount, data, emails, and shared documents. You need to preserve the employee’s Workspace data while also minimizing cost while they are on leave. What should you do?

A.

Suspend their account in the Admin console.

B.

Purchase an Archived User license and assign the license to the employee.

C.

Export the account data by using Takeout, and remove the user license in the Admin console.

D.

Copy the employee’s emails, and transfer their file ownership to a teammate. Delete the user account.

Full Access
Question # 16

You are employed at a multinational organization with offices around the world. You want to ensure that employees in each region receive region-specific emails in a timely manner with minimal administrative burden. When new employees are hired in each region, you want to automate the email distribution process so that staff changes are reflected quickly. What should you do?

A.

Create a Google Group for each region and add the respective employees to the appropriate group.

B.

Create a dynamic group for each region by setting the location as a condition.

C.

Create a Google Group for each region and set permissions that allow employees to discover and join the groups.

D.

Create a security group for each region, and apply the location label to allow employees to join based on their region.

Full Access
Question # 17

During a recent Google Meet video conference, several employees reported that they could not hear the presenters. The presenters confirmed that their laptops’ microphones were working. The affected employees were all using company-issued laptops. You need to quickly diagnose the source of the issue. What should you do first?

A.

Verify that the audio drivers on the affected laptops are up-to-date and functioning correctly.

B.

Check the Admin console to determine whether there are recent Meet-related notifications or alerts.

C.

Check if Context-Aware access rules were set to prevent Meet access from the user’s network location.

D.

Use the Meet quality tool for each affected user to analyze their microphone settings and configurations during the meeting.

Full Access
Question # 18

Your organization's employees frequently collaborate with external clients and vendors by using Google Meet. There are active instances of unsupervised meetings within your organization that do not have a host, and unsupervised meetings that continue after an event has completed. You want to end all meetings that are being used inappropriately as quickly as possible. What should you do?

A.

End all unsupervised meetings by using the Google Meet APIs.

B.

Enable Host Management for Google Meet, and train internal host employees how to end meetings for everyone.

C.

Turn off Google Meet in the Admin console for your organization. Turn Google Meet back on after two minutes.

D.

Identify and end all unsupervised meetings by using the security investigation tool.

Full Access
Question # 19

Your company has recently purchased a new domain name to use for the corporate email addresses. However, you are unable to access certain features in Google Workspace because the domain is not verified. You need to verify the domain. What should you do?

A.

Contact Google support and request manual verification.

B.

Add an MX record to your DNS zone that points to Google Workspace.

C.

Request a TXT record be added to the DNS zone by your domain registrar.

D.

Purchase a SSL certificate for your domain.

Full Access
Question # 20

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Full Access
Question # 21

Your company wants to enable single sign-on (SSO) for its employees to access a newly acquired cloud-based marketing platform. The marketing platform vendor has confirmed SAML 2.0 compatibility and provided the necessary metadata. You need to streamline user access and centralize authentication through Google Workspace. What should you do?

A.

Request an API key from the marketing platform vendor for SAML integration.

B.

Enable two-factor authentication for all users to enhance security before implementing SSO.

C.

Instruct employees to log in to the marketing platform using the Sign In with Google functionality.

D.

Create a new SAML application in the Google Admin console.

Full Access
Question # 22

Your organization has hired temporary employees to work on a sensitive internal project. You need to ensure that the sensitive project data in Google Drive is limited to only internal domain sharing. You do not want to be overly restrictive. What should you do?

A.

Configure the Drive sharing options for the domain to internal only.

B.

Restrict the Drive sharing options for the domain to allowlisted domains.

C.

Create a Drive DLP rule, and use the sensitive internal Project name as the detector.

D.

Turn off the Drive sharing setting from the Team dashboard.

Full Access
Question # 23

You are applying device and user policies for employees in your organization who are in different departments. You need each department to have a different set of policies. You want to follow Google-recommended practices. What should you do?

A.

Create separate top-level organizational units for each department.

B.

Create an Access group for each department. Configure the applicable policies.

C.

Add all managed users and devices in the top-level organizational unit.

D.

Create a child organizational unit for each department.

Full Access
Question # 24

You are configuring email for your company’s Google Workspace account. The company wants to prevent certain types of files from being sent or received as email attachments in the simplest and most cost-effective way. What should you do?

A.

Adjust the maximum message size limit to prevent large files from being sent or received.

B.

Enable the Security Sandbox in Gmail to automatically quarantine emails with suspicious attachments.

C.

Scan all incoming and outgoing emails for malicious attachments by using an industry standard third-party email security solution.

D.

Configure an attachment compliance rule in Gmail settings to block specific file types.

Full Access
Question # 25

Your company provides shared Chromebook workstations for employees to access sensitive company data. You must configure the devices to ensure no sensitive data is stored locally and that browsing data is cleared after each use. What should you do?

A.

Force ephemeral mode in Chrome. Disable offline access for sensitive Workspace apps like Docs, Sheets, and Drive.

B.

Enable the Manage Guest Session functionality, and set the maximum user session length.

C.

Force ephemeral mode in Chrome. Allow offline access for all Workspace apps with strict expiration times.

D.

Disable offline access for all Workspace apps. Enable incognito mode for Chrome browsing sessions.

Full Access
Question # 26

An employee at your organization may be sharing confidential documents with unauthorized external parties. You must quickly determine if any sensitive information has been leaked. What should you do?

A.

Review the employee's Drive log events in the security investigation tool.

B.

Audit Drive access by using the Admin SDK Reports API.

C.

Review the employee's user log events within the security investigation tool.

D.

Create a custom report of the user's external sharing by using the security dashboard.

Full Access
Question # 27

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Full Access