Q: 1
Your organization's information security team has asked you to determine and remediate if a user
([email protected]) has shared any sensitive documents outside of your organization. How would
you audit access to documents that the user shared inappropriately?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Your admin quarantine is becoming a burden to manage due to a consistently high influx of messages
that match the content compliance rule Your security team will not allow you to remove or relax this
rule, and as a result, you need assistance processing the messages in the quarantine. What is the first
step you should take to enable others to help manage the quarantine, while maintaining security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
A user is reporting that after they sign in to Gmail, their labels are not loading and buttons are not
responsive. What action should you take to troubleshoot this issue with the user?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
A retail company has high employee turnover due to the cyclical nature in the consumer space. The
increase in leaked confidential content has created the need for a specific administrative role to
monitor ongoing employee security investigations. What step should you take to increase the
visibility of such investigations?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
You received this email from the head of marketing:
Hello Workspace Admin:
Next week, a new consultant will be starting on the "massive marketing mailing" project. We want to
ensure that they can view contact details of the rest of the marketing team, but they should not have
access to view contact details of anyone else here at our company. Is this something that you can
help with?
What are two of the steps you need to perform to fulfill this request?
Choose 2 answers
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Your company has been engaged in a lawsuit, and the legal department has been asked to discover
and hold all email for two specific users. Additionally, they have been asked to discover and hold any
email referencing “Secret Project 123.”
What steps should you take to satisfy this request?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
What steps does an administrator need to take to enforce TLS with a particular domain?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the
troubleshooting process, Google support asks you to gather logs. How can this be accomplished?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
After a recent transition to Google Workspace, helpdesk has received a high volume of password
reset requests and cannot respond in a timely manner. Your manager has asked you to determine
how to resolve these requests without relying on additional staff.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Your organization recently implemented context-aware access policies for Google Drive to allow
users to access Drive only from corporate managed desktops. Unfortunately, some users can still
access Drive from non-corporate managed machines. What preliminary checks should you perform
to find out why the Context-Aware Access policy is not working as intended? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2