Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Google Google-Workspace-Administrator Dumps Questions Answers

Associate Google Workspace Administrator Questions and Answers

Question 1

A user in your organization reported that their internal event recipient is not receiving the Calendar event invites. You need to identify the source of this problem. What should you do?

Options:

A.

Check whether the business hours are set up in the event recipient's Calendar settings.

B.

Check if Calendar service is turned off for the event creator.

C.

Check whether the Calendar event has more than 50 guests.

D.

Check whether the event recipient has turned off their email notifications for new events in their Calendar settings.

Buy Now
Question 2

You are designing a group structure for your company that will be used to grant access to a specific shared drive. You need this solution to automatically add and remove employees based on their job role. What should you do?

Options:

A.

Create a security group. Add all employees with the desired job role. Grant the security group access to the shared drive.

B.

Create a distribution list. Add all employees with the desired job role. Grant the distribution list access to the shared drive.

C.

Create a dynamic group. Set the membership criteria to the desired job role. Grant the dynamic group access to the shared drive.

D.

Create a configuration group. Add users on an exception basis. Grant the configuration group access to the shared drive.

Question 3

You need to create an automated application or process that includes connectors to external data, leverages Google Sheets data, and is easily shared as a mobile application. What should you do?

Options:

A.

Create an application by using App Engine. Connect the application to your Workspace environment

B.

Copy the external data to BigQuery. Use a Connected Sheet to interact with the data.

C.

Create an AppSheet application to connect the different data sources. Set up the mobile application.

D.

Create an automation process by using Apps Script. Run the process through Google Sheets.

Question 4

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external GoogleGroups with their Google Workspace accounts without interrupting internal group usage. What should you do?

Options:

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.

B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.

C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.

D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.

Question 5

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

Options:

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Question 6

An employee with a Workspace Business Plus license at your company is going on a long leave soon. The employee will not need access to their Google Workspace data, but their teammates will need access to the employee’s data. When the employee returns from leave, you will need to restore access to theiraccount, data, emails, and shared documents. You need to preserve the employee’s Workspace data while also minimizing cost while they are on leave. What should you do?

Options:

A.

Suspend their account in the Admin console.

B.

Purchase an Archived User license and assign the license to the employee.

C.

Export the account data by using Takeout, and remove the user license in the Admin console.

D.

Copy the employee’s emails, and transfer their file ownership to a teammate. Delete the user account.

Question 7

Your organization requires enhanced privacy and security when sending messages to banks and other financial institutions. Your organization uses Gmail, but the banks use various other email providers. You need to maximize privacy and limit access to messages sent and received between your organization and the banks. What should you do?

Options:

A.

Set up Transport Layer Security (TLS) compliance for inbound and outbound messages with a list of the banks’ email domains. Validate the TLS connections.

B.

Configure Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication for your email domains.

C.

Enable Protect against unauthenticated emails in Gmail Safety.

D.

Enable confidential mode for Gmail. Instruct employees to use confidential mode when sending messages to the banks.

Question 8

Today your company signed up for Google Workspace Business Starter with an existing domain name. You want to add team members and manage their access to email and other services. However, you are unable to create new user accounts or change user settings. You need to fix this problem. What should you do?

Options:

A.

Run the Transfer tool to bring unmanaged users to your Workspace account.

B.

Check domain ownership in the DNS settings.

C.

Wait 24 hours after signing up for the features to become active.

D.

Upgrade to a Google Workspace Enterprise edition.

Question 9

You are migrating your organization’s email to Google Workspace. Your organization uses the terramearth.com email domain. You need to configure Google Workspace to receive emails sent to terramearth.com. What should you do?

Options:

A.

Add terramearth.com as a primary, secondary, or alias domain in Google Workspace. Update the Mail Exchange (MX) records with your domain registrar to direct mail flow to Google’s mail servers.

B.

Establish a Transport Layer Security (TLS) connection between your company’s existing mail servers and Google’s mail servers

C.

Configure an email address in Google Workspace to capture emails sent to unverified domains, including terramearth.com.

D.

Create a domain alias for terramearth.com in Google Workspace. Configure email forwarding to redirect emails to the new Google Workspace accounts.

Question 10

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

Options:

A.

Assign the trusted employees as moderators for the relevant Chat spaces.

B.

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared

C.

Use the security investigation tool to audit and monitor Chat messages.

D.

Disable all Chat spaces except those specifically approved by management.

Question 11

Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?

Options:

A.

Add the Trusted Workspace domain names in the Stream dialog box.

B.

Turn off live streaming to Youtube.

C.

Add participants to an organizational unit (OU). Turn on live streaming.

D.

Turn on in-house live streaming. Invite users from affiliated domains.

Question 12

A new user at your organization is unable to access Google Meet. You have verified that the user’s account is active and the correct licenses are assigned. You need to resolve the access issue. What should you do?

Options:

A.

Check the user’s browser settings to ensure that Meet is not blocked.

B.

Instruct the user to clear their browser’s cache and cookies.

C.

Restart the user’s computer to refresh their network connection.

D.

Verify that Meet is enabled as a service for the user’s account in the Admin console.

Question 13

Your organization is about to conduct its biannual risk assessment. You need to help identify security risks by quickly reviewing all security settings for Gmail, Drive, and Calendar. What should you do?

Options:

A.

In the reporting section of the Admin console, review the Gmail, Drive, and Calendar reports.

B.

In the alert center, review all of the alerts.

C.

In each individual organizational unit (OU), review the security settings.

D.

In the Google Admin console, review the security health page.

Question 14

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

Options:

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Question 15

A user in your organization received a spam email that they reported for further investigation. You need to find out more details and the scope of this incident as quickly as possible. What should you do?

Options:

A.

Conduct a Vault search to find this email and identify if additional users were affected.

B.

Conduct a search to find all emails sent by the sender by using the Gmail API.

C.

Conduct an Email reports search to find this email and all of the email's recipients.

D.

Conduct a search in the security investigation tool to find this email, and identify whether additional users were affected.

Question 16

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Question 17

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Options:

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Question 18

You are managing the buildings and resources for your organization. You need to create several conference rooms with a capacity of 10 people each, equipped with a whiteboard and projector, and wheelchair accessible. You want to ensure the process is efficient. What should you do?

Options:

A.

Automate room creation by using a third-party app from the Google Workspace Marketplace.

B.

Create a CSV file and add all resources. Write a script using the Workspace API to reference the CSV file and create all the resources.

C.

Create each conference room individually in the Google Admin console. Add the features for each room.

D.

Use the Google Admin console to bulk upload the rooms. Create a resource with the specified features and apply the features to that resource.

Question 19

You are applying device and user policies for employees in your organization who are in different departments. You need each department to have a different set of policies. You want to follow Google-recommended practices. What should you do?

Options:

A.

Create separate top-level organizational units for each department.

B.

Create an Access group for each department. Configure the applicable policies.

C.

Add all managed users and devices in the top-level organizational unit.

D.

Create a child organizational unit for each department.

Question 20

Your organization recently deployed Google Workspace. Over 3,000 external contacts were shared in public folders in Microsoft Exchange before the implementation. You need to ensure that these external contacts appear to domain users in Gmail. What should you do?

Options:

A.

Export the external contacts to a CSV file, upload the file to Google Drive, and instruct users to import to their My Contacts.

B.

Use Google Cloud Directory Sync to sync the external contacts from the public folders in Microsoft Exchange to the Directory.

C.

Use the Domain Shared Contacts API to add the external contacts to the Directory.

D.

Create a user account, add the external contacts, and delegate them to all users in the domain.

Question 21

You are configuring Google Chat for your organization. Using the Adin console, you want to enable employees to view their chat history by default and allow employees to turn off chat history. What should you do?

Options:

A.

Configure Google Vault to retain all Chat messages, and exclude organizational units (OUs) with users who want to turn Chat history off.

B.

Set the space history setting to OFF and chat history to ON.

C.

Set the top-level default conversation history setting to ON and allow users to change their history setting.

D.

Set the top-level default conversation history settings to OFF and allow users in each organizational unit (OU) to change their history setting.

Question 22

Multiple users in your organization are reporting that Calendar invitations sent from a specific department are not being received. You verified that the invitations are being sent and there are no error messages in the sender’s logs. You want to troubleshoot the issue. What should you do?

Options:

A.

Analyze the message headers of the sent invitations by using the Google Admin Toolbox to identify any delivery issues.

B.

Verify that the senders in the specific department have the necessary permissions to share their calendars externally and send invitations outside of the organization.

C.

Disable and re-enable the Calendar service for the affected users to refresh their connection.

D.

Check the affected users’ Calendar settings to confirm whether they have accidentally blocked invitations from the specific department.

Question 23

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Options:

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Question 24

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Question 25

Your company has a globally distributed remote work team. You want to ensure all team members adhere to the company's data security policies and only access authorized systems based on their location and role. What should you do?

Options:

A.

Create and enforce data loss prevention (DLP) rules to control data sharing.

B.

Set up and mandate the use of a company-wide VPN for all remote access.

C.

Implement two-factor authentication for all remote team members.

D.

Configure access control policies with conditional access.

Question 26

Your company operates several primary care clinics where employees routinely work with protected health information (PHI). You are in the process of transitioning the organization to Google Workspace from a legacy communication and collaboration system. After you sign the Business Associate Agreement (BAA), you need to ensure that data is handled in compliance with regulations when using Google Workspace. What should you do?

Options:

A.

Implement a third-party backup service that is also compliant with Google Workspace core services.

B.

Create a label for Google Drive content to help employees identify sensitive data.

C.

Instruct the staff to not store any PHI in Google Workspace core services, including Google Drive. Docs. Sheets, and Keep.

D.

Disable integrations with third-party apps and turn off non-core Google services.

Question 27

Your company has recently migrated from an on-premises email solution to Google Workspace. You have successfully added and verified the new primary domain. However, you also want to continue receiving emails sent to your former on-premises email server for a transitional period. You need to ensure that emails sent to your former domain are still delivered to your on-premises server, even though your primary email system is now Google Workspace. What should you do?

Options:

A.

Configure MX records for the former domain to point to your on-premises email servers.

B.

Add the former domain as a secondary domain in your Google Workspace settings and verify the domain.

C.

Adjust the TTL (Time-to-Live) for the former domain to ensure a smooth transition.

D.

Add the former domain as a domain alias for the primary domain.