Q: 11
Your company recently acquired an organization that was not leveraging Google Workspace. Your
company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into
Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with
the newly acquired organization, which also has its users in an LDAP directory. How should you
change your GCDS instance to ensure that the setup is successful? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
You are in the middle of migrating email from on-premises Microsoft Exchange to Google Workspace.
Users that you have already migrated are complaining of messages from internal users going into
spam folders. What should you do to ensure that internal messages do not go into Gmail spam while
blocking spoofing attempts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Your organization is concerned with the increasing threat of phishing attacks that may impact users.
Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to
prevent unauthorized access to user accounts.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Your cyber security team has requested that all email destined for external domains be scanned for
credit card numbers, and if found, the email must be encrypted using your cloud-based third-party
encryption provider. You are responsible for configuring to meet this request.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
As the Workspace Administrator, you have been asked to configure Google Cloud Directory Sync
(GCDS) in order to manage Google Group memberships from an internal LDAP server. However,
multiple Google Groups must have their memberships managed manually. When you run the GCDS
sync, you notice that these manually managed groups are being deleted. What should you do to
prevent these groups from being deleted?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Your organization has a new security requirement around data exfiltration on iOS devices. You have a
requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets,
and Slides) in their work account to a Google app in their personal account or a third-party app. What
steps should you take from the admin panel to prevent users from copying data from work to non-
work apps on iOS devices?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
An administrator accidentally deleted several Workspace user accounts from the Google Admin
Console two weeks ago. How can you recover the deleted user accounts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
The organization has conducted and completed Security Awareness Training (SAT) for all employees.
As part of a new security policy, employees who did not complete the SAT have had their accounts
suspended. The CTO has requested to be informed of any accounts that have been re-enabled to
ensure no one is in violation of the new security policy.
What should you do?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
As a team manager, you need to create a vacation calendar that your team members can use to
share their time off. You want to use the calendar to visualize online status for team members,
especially if multiple individuals are on vacation What should you do to create this calendar?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be
able to do the following on these devices:
Control password policies.
Make corporate apps available to the users.
Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2