Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Google Google-Workspace-Administrator - Associate Google Workspace Administrator

Your organization is about to conduct its biannual risk assessment. You need to help identify security risks by quickly reviewing all security settings for Gmail, Drive, and Calendar. What should you do?

A.

In the reporting section of the Admin console, review the Gmail, Drive, and Calendar reports.

B.

In the alert center, review all of the alerts.

C.

In each individual organizational unit (OU), review the security settings.

D.

In the Google Admin console, review the security health page.

Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentiallyleading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?

A.

Add a banner to the newsletter that warns users that external sharing is prohibited.

B.

Create a Gmail content compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected

C.

Develop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.

D.

Create a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

You need to ensure that data owned by former employees remains available in Google Vault. You want to use the most cost-effective solution.

What should you do?

A.

Migrate the former employees’ Gmail to their manager(s) by using the data migration service during the deletion process. Transfer the former employees’ Google Drive files to a new owner.

B.

Change the Google account passwords of the former employees.

C.

Suspend the former employees’ Google accounts. Create an organizational unit (OU). Move the former employees into that OU.

D.

Assign an Archived User license to the former employees’ Google accounts.

A user in your organization reported that their internal event recipient is not receiving the Calendar event invites. You need to identify the source of this problem. What should you do?

A.

Check whether the business hours are set up in the event recipient's Calendar settings.

B.

Check if Calendar service is turned off for the event creator.

C.

Check whether the Calendar event has more than 50 guests.

D.

Check whether the event recipient has turned off their email notifications for new events in their Calendar settings.

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

A.

Conduct a Vault search to find this email and identify if additional users were affected.

B.

Conduct a search to find all emails sent by the sender by using the Gmail API.

C.

Conduct an Email reports search to find this email and all of the email's recipients.

D.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

You’ve received multiple reports about a suspicious email from someone who is pretending to be from your organization’s human resources department. The email is prompting employees to click a link for a password update. You want to remediate this sender’s emails. What should you do?

A.

Use the security investigation tool to search for users who received the suspicious email, and select Mark message as phishing.

B.

Use the security investigation tool to action the suspicious email and select Mark message as spam.

C.

Create an activity rule to alert administrators to similar emails from that sender.

D.

Notify all employees and request that they report this email as spam.