Google Google Workspace Administrator Professional Google Workspace Administrator Online Training
Google Google Workspace Administrator Online Training
The questions for Google Workspace Administrator were last updated at Jun 19,2025.
- Exam Code: Google Workspace Administrator
- Exam Name: Professional Google Workspace Administrator
- Certification Provider: Google
- Latest update: Jun 19,2025
After migrating to Google Workspace, your legal team requests access to search all email and create litigation holds for employees who are involved with active litigation. You need to help the legal team meet this request.
What should you do?
- A . Add the legal team to the User Management Admin system role.
- B . Add the legal team to the Google Vault Google Group.
- C . Create a custom role with Google Vault access, and add the legal team.
- D . Create a matter in Google Vault, and share with the legal team.
Your Finance team has to share quarterly financial reports in Sheets with an external auditor. The external company is not a Workspace customer and allows employees to access public sites such as Gmail and Facebook.
How can you provide the ability to securely share content to collaborators that do not have a Google Workspace or consumer (Gmail) account?
- A . Allow external sharing with the auditor using the ‘Trusted Domains’ feature.
- B . Enable the ‘Visitor Sharing’ feature, and demonstrate it to the Finance team.
- C . Use the ‘Publish’ feature in the Sheets editor to share the contents externally.
- D . Attach the Sheet file to an email message, and send to the external auditor.
You are in the middle of migrating email from on-premises Microsoft Exchange to Google Workspace. Users that you have already migrated are complaining of messages from internal users going into spam folders.
What should you do to ensure that internal messages do not go into Gmail spam while blocking spoofing attempts?
- A . Train users to click on Not Spam button for emails.
- B . Add all users of your domain to an approved sender list.
- C . Force TLS for your domain.
- D . Ensure that your inbound gateway is configured with all of your Exchange server IP addresses.
You are configuring a shared drive for the financial department of your organization. The financial team wants to allow members of the shared drive to add. edit, and move documents into the shared drive. It’s important that the same users cannot remove or delete files.
How can you configure access for these users to match the team’s request?
- A . Set up the shared drive, and add the users as Content Managers of the drive.
- B . Set up the shared drive, and add the users as editors of the drive.
- C . Set up the shared drive, and add the users as Contributors of the drive.
- D . Set up the shared drive, and add the users as Managers of the drive.
The credentials of several individuals within your organization have recently been stolen. Using the Google Workspace login logs, you have determined that in several cases, the stolen credentials have been used in countries other than the ones your organization works in.
What else can you do to increase your organization’s defense-in-depth strategy?
- A . Implement an IP block on the malicious user’s IPs under Security Settings in the Admin Console.
- B . Use Context-Aware Access to deny access to Google services from geo locations other than the ones your organization operates in.
- C . Enforce higher complexity passwords by rolling it out to the affected users.
- D . Use Mobile device management geo-fencing to prevent malicious actors from using
these stolen credentials.
Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.
What should you do?
- A . Run the Transfer Tool for Unmanaged users.
- B . Use a Google Form to survey the Marketing department users.
- C . Assure the VP that there is no action required to configure Google Workspace.
- D . Contact Google Enterprise Support to identify affected users.
The CFO just informed you that one of their team members wire-transferred money to the wrong account because they received an email that appeared to be from the CFO. The CFO has provided a list of all users that may be responsible for sending wire transfers. The CFO also provided a list of banks the company sends wire transfers to. There are no external users that should be requesting wire transfers. The CFO is working with the bank to resolve the issue and needs your help to ensure that this does not happen again.
What two actions should you take? (Choose two.)
- A . Configure objectionable content to reject messages with the words “wire transfer.”
- B . Verify that DMARC, DKIM, and SPF records are configured correctly for your domain.
- C . Create a rule requiring secure transport for all messages regarding wire transfers.
- D . Add the sender of the wire transfer email to the blocked senders list.
- E . Enable all admin settings in Gmail’s safety > spoofing and authentication.
You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location.
How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?
- A . Configure a data region at the top level OU of your organization, and set the value to “Europe”.
- B . Add three additional OU structures to designate location within the current OU structure.
Assign the corresponding data region to each. - C . Configure a configuration group for European users, and set the data region to “Europe”.
- D . Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.
Your company has just acquired a new group of users. They have been provisioned into the Google Workspace environment with your primary domain as their primary email address. These new users still need to receive emails from their previous domain.
What is the best way to achieve this for these new users, without updating the information of pre-existing users?
- A . Add the acquired domain as an alias to the primary Google Workspace domain.
- B . Add the acquired domain as a secondary domain to the primary Google Workspace domain, and then update the email information of all new users with alias emails.
- C . Update the Google-provided test domain to be the domain of the acquired company, and then update the email information of all new users with alias emails.
- D . Without adding a domain, update each user’s email information with the previous domain.
Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.
What are two ways you should accomplish this? (Choose two.)
- A . Use the Data Export Tool to export admin audit data to your existing SIEM system
- B . Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
- C . Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
- D . Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
- E . Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.