Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Google Google-Workspace-Administrator Associate Google Workspace Administrator Exam Practice Test

Associate Google Workspace Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentiallyleading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?

Options:

A.

Add a banner to the newsletter that warns users that external sharing is prohibited.

B.

Create a Gmailcontent compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected

C.

Develop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.

D.

Create a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.

Question 2

The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?

Options:

A.

Instruct the IT department to directly access and forward the relevant emails to the legal department.

B.

Temporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.

C.

Ask a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.

D.

Use Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.

Question 3

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Question 4

You need to grant a specific set of users in your company access to YouTube, and you want to restrict their access to Merchant Center. What should you do?

Options:

A.

Enable YouTube for all users in the company. Individually restrict access to Merchant Center for specific Groups or organizational units (OUs).

B.

Create YouTube and Merchant Center as custom web apps. Apply access policies at the Group or organizational unit (OU) level.

C.

Contact Google Support and request that they enable YouTube access for the specific set of users and restrict their access to Merchant Center.

D.

Enable access to YouTube at the Group or organizational unit (OU) level for the subset of users. Disable access to Merchant Center.

Question 5

Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?

Options:

A.

Add the Trusted Workspace domain names in the Stream dialog box.

B.

Turn off live streaming to Youtube.

C.

Add participants to an organizational unit (OU). Turn on live streaming.

D.

Turn on in-house live streaming. Invite users from affiliated domains.

Question 6

External sharing at your company is only permitted for the sales and marketing department. Engineering is not allowed to share externally. You need to configure the sharing settings to comply with this policy. What should you do?

Options:

A.

Use a data loss prevention (DLP) solution to control external sharing based on user groups.

B.

Create separate shared drives for each department with different external sharing settings.

C.

Create organizational units (OUs) for each department. Configure different external sharing settings for each OU.

D.

Configure Drive trust rules to restrict the engineering department from sharing externally.

Question 7

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

Options:

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

Question 8

Your organization is about to conduct its biannual risk assessment. You need to help identify security risks by quickly reviewing all security settings for Gmail, Drive, and Calendar. What should you do?

Options:

A.

In the reporting section of the Admin console, review the Gmail, Drive, and Calendar reports.

B.

In the alert center, review all of the alerts.

C.

In each individual organizational unit (OU), review the security settings.

D.

In the Google Admin console, review the security health page.

Question 9

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

Options:

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Question 10

Your organization wants to prevent a group of users from logging into their Google Drive when they are traveling internationally for business.

You have added these users to an organizational unit (OU). You need to secure the users’ access to the Google Drive app to meet this requirement.

What should you do?

Options:

A.

Disable Google Drive for users in the OU.

B.

Define location-based access levels. Assign the levels to the Google Drive app for the OU.

C.

Require 2-step verification (2SV) when users in the OU sign in.

D.

Define user-based access levels. Assign the levels to the Google Drive app for the OU.

Question 11

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

Options:

A.

Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.

B.

Set up email forwarding from your on-premises email provider to Gmail.

C.

Create a content compliance rule to filter and route incoming emails.

D.

Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.

Question 12

An employee is leaving your company and has numerous files stored in My Drive. Their manager wants to retain access to these files. You need to offboard the departing employee’s Google Workspace account while ensuring that the manager can still access the files while following Google-recommended practices. What should you do?

Options:

A.

Use Google Vault to establish a retention policy for the organizational unit (OU) of the departing employee. Assign the Google Archived User license.

B.

Instruct the departing employee to share their My Drive folder with the manager before leaving. Delete the Google Workspace account on the departing employee’s last day.

C.

Download the departing employee’s Drive data by using Google Takeout. Upload the data to the manager’s Drive before deleting the departing employee’s Google Workspace account.

D.

Transfer ownership of the departing employee’s files to the manager during the user deletion process.

Question 13

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Question 14

You are configuring email for your company’s Google Workspace account. The company wants to prevent certain types of files from being sent or received as email attachments in the simplest and most cost-effective way. What should you do?

Options:

A.

Adjust the maximum message size limit to prevent large files from being sent or received.

B.

Enable the Security Sandbox in Gmail to automatically quarantine emails with suspicious attachments.

C.

Scan all incoming and outgoing emails for malicious attachments by using an industry standard third-party email security solution.

D.

Configure an attachment compliance rule in Gmail settings to block specific file types.

Question 15

Your company has purchased Gemini licenses for a subset of employees. You need to ensure that only users in the marketing and sales departments have access to Gemini features by using the most efficient approach. What should you do?

Options:

A.

Create a script to assign a Gemini license to new users if they are in marketing or sales. Run the script daily.

B.

Create an organizational unit (OU) for marketing and sales. Assign the Gemini licenses to that OU, and enable Gemini for that OU only.

C.

Assign Gemini licenses to each user in the marketing and sales departments.

D.

Enable Gemini for the entire organization. Instruct users in other departments not to use Gemini.

Question 16

The current data storage limit for the sales organizational unit (OU) at your company is set at 10GB per user. A subset of sales representatives in that OU need 100GB of storage across shared services. You need to increase the storage for only the subset of sales representatives by using the least disruptive approach and the fewest configuration steps. What should you do?

Options:

A.

Move the subset of users to a sub-OU, and assign a 100GB storage limit to that sub-OU.

B.

Instruct the subset of users to store their documents in a Shared Drive with a 100GB limit.

C.

Change the storage limit of the sales OU to 100GB.

D.

Create a configuration group, and add the subset of users to that group. Set the group storage limit to 100GB.

Question 17

The names and capacities of several conference rooms have been updated. You need to use the most efficient way to update these details.

What should you do?

Options:

A.

Export the resource list to a CSV file, make the changes, and re-import the updated file.

B.

Edit each resource in the Google Admin console.

C.

Add the modified rooms as new resources. Tell employees not to use old rooms.

D.

Delete the existing resources and recreate the resources with the updated information.

Question 18

Several employees at your company received messages with links to malicious websites. The messages appear to have been sent by your company’s human resources department. You need to identify which users received the emails and prevent a recurrence of similar incidents in the future. What should you do?

Options:

A.

Search the sender’s email address by using Email Log Search. Identify the users that received the messages. Instruct them to mark them as spam in Gmail, delete the messages, and empty the trash.

B.

Search for the sender’s email address by using the security investigation tool. Mark the messages as phishing. Add the sender’s email address to the Blocked senders list in the Spam, Phishing and Malware setting in Gmail to automatically reject future messages.

C.

Collect a list of users who received the messages. Search the recipients’ email addresses in Google Vault. Export and download the malicious emails in PST file format. Add the sender’s email address to a quarantine list setting in Gmail to quarantine any future emails from the sender.

D.

Search for the sender’s email address by using the security investigation tool. Delete the messages. Turn on the safety options for spoofing and authentication protection in Gmail settings.

Question 19

A user is experiencing intermittent issues accessing their Gmail inbox. Sometimes their Gmail loads slowly, and other times the user encounters error messages that haven’t been documented. You need to effectively troubleshoot this recurring problem. What should you do?

Options:

A.

Check the Google Workspace Status Dashboard for any reported service disruptions.

B.

Instruct the user to generate a HAR file the next time they experience slowness or an error.

C.

Instruct the user to try to access Gmail from another device or network to see if the issue persists.

D.

Instruct the user to clear their browser cache and cookies.

Question 20

Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.

You need to enforce the new password policy in Google Workspace. What should you do?

Options:

A.

Share the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.

B.

Enable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.

C.

Create a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.

D.

Create a password policy in Active Directory. Enable password synchronization in GCDS.

Question 21

Your company’s help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?

Options:

A.

Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.

B.

Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).

C.

Turn off more aggressive spam filtering in spam policies that are applied to the users’ organizational unit and add the senders’ mail system IP addresses to the email allowlist.

D.

Create an address list of approved senders so messages from these users bypass Gmail’s spam filters and recipients can decide whether they are spam or not.