Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Google Google-Workspace-Administrator - Associate Google Workspace Administrator

Your organization is concerned about unauthorized access attempts. You want to implement a security measure that makes users change their password if there are twenty or more failed login attempts within one hour. You want to use the most effective and efficient approach. What should you do?

A.

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.

B.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.

C.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.

D.

Enable email alerts to notify users that they need to change their password.

Users at your company are reporting that they are not receiving some emails in their corporate Gmail account. You have checked the Google Workspace Status Dashboard and you found no service disruptions. You need to identify the root cause of the problem and resolve the mail delivery issues. What should you do? (Choose two.)

A.

Use Email Log Search (ELS) to identify specific delivery failures.

B.

Verify whether the organization’s Mail Exchange (MX) records are correctly configured.

C.

Check the users’ spam folders to determine whether emails are being misdirected.

D.

Investigate the Gmail log events for error messages or unusual patterns.

E.

Check the senders’ IP addresses in the inbound mail gateway.

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

A.

Adjust the organization’s mail content compliance settings in the Admin console.

B.

Advise users to individually allowlist senders.

C.

Disable spam filtering for all users.

D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

You notice an increase in support cases related to Chrome browser within your organization. You suspect a potential outage or service disruption with Chrome browser. You need to determine whether any information has been released about the issue and if there are any projected timelines for its resolution. What should you do first?

A.

Use the Help Assistant within the Google Admin console to identify if there was a recent outage.

B.

Collect a HAR file, and use the Google Admin Toolbox to identify potential failures.

C.

Review the Google Workspace Status Dashboard.

D.

Log a case with Chrome Enterprise support.

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

A.

Assign the trusted employees as moderators for the relevant Chat spaces.

B.

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared

C.

Use the security investigation tool to audit and monitor Chat messages.

D.

Disable all Chat spaces except those specifically approved by management.

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

A.

Redirect the acquired domain to Google’s MX records and add the account as a “send as” address.

B.

Set up the acquired agency as a secondary domain from the Manage domains page.

C.

Set up the acquired agency as a user alias domain from the Manage domains page.

D.

Set up the acquired agency as a secondary domain and swap it to the primary domain.

The innovation team at your organization has a dedicated room with prototype equipment. You need to make the room bookable, add the equipment, and ensure that there are no booking conflicts. Only the innovation team and the sales directors can access this room. What should you do?

A.

Create a separate Google Calendar resource for the room. Manually manage booking requests from both teams.

B.

Create a Google Group for the innovation team and another Google Group for sales directors. Share the room's calendar with both groups.

C.

Create a Google Calendar event for the room. Share the event with the innovation team and sales directors.

D.

Edit the Google Calendar settings for the room resource. Adjust the permission settings so only the innovation team and sales director group can view and book time on this calendar.

Your company has just started using Search Ads 360. You need to limit access to Additional Google services for your entire organization by using the Admin console. Only the marketing team and a specific group of users from the web design team should have access. What should you do?

A.

Enable Search Ads 360 for both the marketing and web design team organizational units (OUs). Create a group to explicitly deny access to Search Ads 360. Assign the group to the web design users who should not have access.

B.

Enable Search Ads 360 at the top level of your organizational structure.

C.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a sub-OU under the marketing OU. and move the web design team users who need access into this sub-OU.

D.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a new group in the Admin console that includes the web design team users who need access. Enable Search Ads 360 for that group.

An employee is leaving your company and has numerous files stored in My Drive. Their manager wants to retain access to these files. You need to offboard the departing employee’s Google Workspace account while ensuring that the manager can still access the files while following Google-recommended practices. What should you do?

A.

Use Google Vault to establish a retention policy for the organizational unit (OU) of the departing employee. Assign the Google Archived User license.

B.

Instruct the departing employee to share their My Drive folder with the manager before leaving. Delete the Google Workspace account on the departing employee’s last day.

C.

Download the departing employee’s Drive data by using Google Takeout. Upload the data to the manager’s Drive before deleting the departing employee’s Google Workspace account.

D.

Transfer ownership of the departing employee’s files to the manager during the user deletion process.