- All Exams Instant Download
What should you do?
After a recent transition to Google Workspace, helpdesk has received a high volume of password reset requests and cannot respond in a timely manner. Your manager has asked you to determine how to resolve these requests without relying on additional staff. What should you do?A . Create a custom Apps...
What should you do?
Your company frequently hires from five to ten interns for short contract engagements and makes use of the same generically named Google Workspace accounts (e.g., [email protected], [email protected], [email protected]). The manager of this program wants all email to these accounts routed to the manager's mailbox account also. What should you do?A...
What two things should you do?
Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else. What two things should you do? (Choose two.)A . Disable Guest Mode and Public Sessions.B . Enable a Device Policy...
What two actions should you take?
HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by...
What is the first step you should take to enable others to help manage the quarantine, while maintaining security?
Your admin quarantine is becoming a burden to manage due to a consistently high influx of messages that match the content compliance rule Your security team will not allow you to remove or relax this rule, and as a result, you need assistance processing the messages in the quarantine. What...
What two actions should you take?
Security and Compliance has identified secure third-party applications that should have access to Google Workspace data. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)A . Whitelist Trusted AppsB . Disable the Drive SDKC . Restrict API scopesD . Disable add-ons...
What should you do?
Your company recently decided to use a cloud-based ticketing system for your customer care needs. You are tasked with rerouting email coming into your customer care address, [email protected] to the cloud platform’s email address, [email protected]. As a security measure, you have mail forwarding disabled at the domain level. What should...
What should you do?
Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern. What should you do?A . Use the conflict account remove tool...
Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features?
Your organization has just completed migrating users to Workspace. Many employees are concerned about their legacy Microsoft Office documents, including issues of access, editing, and viewing. Which two practices should you use to alleviate user concerns without limiting Workspace collaboration features? (Choose two.)A . Configure Context-Aware Access policies to block...
How should you implement a scan of all incoming email attachments?
The nature of your organization's business makes your users susceptible to malicious email attachments. How should you implement a scan of all incoming email attachments?A . Configure a safety rule to protect against encrypted attachments from untrusted sendersB . Configure a safety rule to protect against attachments with scripts from...