Google Google Workspace Administrator Übungsprüfungen
Zuletzt aktualisiert am 06.05.2025- Prüfungscode: Google Workspace Administrator
- Prüfungsname: Professional Google Workspace Administrator
- Zertifizierungsanbieter: Google
- Zuletzt aktualisiert am: 06.05.2025
Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Workspace data should be stored in a separate backup environment.
How should you store data for this situation?
- A . Use routing rules to dual-deliver mail to an on-premises SMTP server and Google Workspace.
- B . Write a script and use Google Workspace APIs to access and download user data.
- C . Use a third-party tool to configure secure backup of Google Workspace data.
- D . Train users to use Google Takeout and store their archives locally.
As a Workspace Administrator, you want to keep an inventory of the computers and mobile devices your company owns in order to track details such as device type and who the device is assigned to. How should you add the devices to the company-owned inventory?
- A . Download the company owned inventory template CSV file from the admin panel, enter the serial number of the devices, and upload it back to the company owned inventory in the admin panel.
- B . Download the company owned inventory template CSV file from the admin panel, enter the Device OS, serial number and upload it back to the company owned inventory in the admin panel.
- C . Download the company owned inventory template CSV file from the admin panel, enter the asset tag of the devices, and upload it back to the company owned inventory in the admin panel.
- D . Download the company owned inventory template CSV file from the admin panel, enter the Device OS, asset tag and upload it back to the company owned inventory in the admin panel.
Your organization has a strict requirement that your temporary employees can only send emails to and receive emails from specific external domains. You must define a policy in Google Workspace that meets this requirement for users in the temporary employee organizational unit (OU).
What should you do?
- A . Create a policy in Gmail settings that rewrites the recipient for outbound messages and quarantines incoming messages to review before delivery
- B . Add the allowed domains when configuring the restrict delivery setting in Gmail settings, and select the box to bypass for internal emails
- C . Restrict sending and receiving to Google Groups, and carefully curate the temporary employees" memberships
- D . Configure the restrict delivery setting to limit domains that the temporary employees can communicate with Allow Google Docs sharing
Your company moved to Google Workspace last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session.
How should you accomplish this?
- A . In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.
- B . Room participants will need to start the meeting from the remote in the room.
- C . By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.
- D . Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.
A user has reported that they did not receive an email from one of their normal correspondents.
What information do you need to collect from the user to investigate the cause of the issue?
- A . The email address of the sender and the subject and date/time of the missing message.
- B . The type of device the individual is using, including the OS version, browser, and browser version.
- C . The sender’s domain so you can review their SPF and DKIM configuration.
- D . The sender’s IP address, mail client, and mail platform.
Your Accounts Payable department is auditing software license contracts companywide and has asked you to provide a report that shows the number of active and suspended users by organization unit, which has been set up to match the Regions and Departments within your company. You need to produce a Google Sheet that shows a count of all active user accounts and suspended user accounts by Org unit.
What should you do?
- A . From the Admin Console Billing Menu, turn off auto-assign, and then click into Assigned Users and export the data to Sheets.
- B . From the Admin Console Users Menu, download a list of all Users to Google Sheets, and join that with a list of ORGIDs pulled from the Reports API.
- C . From the Google Workspace Reports Menu, run and download the Accounts Aggregate report, and export the data to Google Sheets.
- D . From the Admin Console Users Menu, download a list of all user info columns and currently selected columns.
Your organization was recently targeted by a phishing attempt that affected several users You must
efficiently determine the full extent of the phishing attempt and prevent further issues from occurring.
What should you do?
- A . • 1 Search BigQuery 0Q9 Km b I message marked as phishing
• 2 Require Transport Layer Security (TLS) for all email communications
• 3 Instruct all users to reset their passwords - B . • 1 Use email log search to pull all emails for the past three days
• 2 Analyze logs of common emails received and contact users.
• 3 Instruct users on how to create a Gmail filter to block malicious email addresses - C . • 1 Use the security dashboard to view the number of messages showing evidence of potential spoofing and then use the investigation tool on affected users to remove malicious email
• 2 Enable advanced phishing and malware protection
• 3 Deploy Google s Password Alert extension for Chrome - D . • 1 Collect phishing samples forwarded from users
• 2 Add IP addresses and email addresses to your denylist
• 3. Enroll only affected users to multi-factor authentication (MFA)
Your executive team has asked you to export all available data for 1,200 of your 1,500 Google Workspace Domain users.
How should you proceed to export the data with the least amount of effort?
- A . Perform a search in Google Vault for the 500 users and export all of the results.
- B . Create a shared drive for the exports. Instruct end users to manually use Google Takeout to export the data and place the exported files in the shared drive.
- C . Contact Google Cloud support to perform the export for you.
- D . Contact Google Cloud Support to enable the Data Export tool for your organization, because you have more than 1,000 users, then use the tool to export data for the domain, and remove any unnecessary user data.
As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data.
What should you do?
- A . Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.
- B . Open Admin Console > Security > API Controls > App Access Control > Manage Google Services.
- C . Open Admin Console > Security > Less Secure Apps.
- D . Open Admin Console > Security > API Controls > App Access Control > Settings.
Your organization has been on Google Workspace Enterprise for one year. Recently, an admin turned on public link sharing for Drive files without permission from security. Your CTO wants to get better insight into changes that are made to the Google Workspace environment. The chief security officer wants that data brought into your existing SIEM system.
What are two ways you should accomplish this? (Choose two.)
- A . Use the Data Export Tool to export admin audit data to your existing SIEM system
- B . Use Apps Script and the Reports API to export admin audit data to your existing SIEM system.
- C . Use Apps Script and the Reports API to export drive audit data to the existing SIEM system
- D . Use the BigQuery export to send admin audit data to the existing SIEM system via custom code
- E . Use the BigQuery export to send drive audit data to the existing SIEM system via custom code.