Google Google Workspace Administrator Übungsprüfungen
Zuletzt aktualisiert am 06.05.2025- Prüfungscode: Google Workspace Administrator
- Prüfungsname: Professional Google Workspace Administrator
- Zertifizierungsanbieter: Google
- Zuletzt aktualisiert am: 06.05.2025
Your company uses a whitelisting approach to manage third-party apps and add-ons. The Senior VP of Sales & Marketing has urgently requested access to a new Marketplace app that has not previously been vetted.
The company’s Information Security policy empowers you, as a Google Workspace admin, to grant provisional access immediately if all of the following conditions are met:
✑ Access to the app is restricted to specific individuals by request only.
✑ The app does not have the ability to read or manage emails.
✑ Immediate notice is given to the Infosec team, followed by the submission of a security risk analysis report within 14 days.
Which actions should you take first to ensure that you are compliant with Infosec policy?
- A . Move the Senior VP to a sub-OU before enabling Marketplace Settings > “Allow Users to Install Any App from Google Workspace Marketplace.”
- B . Confirm that the Senior VP’s OU has the following Gmail setting disabled before whitelisting the app: “Let users delegate access to their mailbox.”
- C . Add the Marketplace app, then review the authorized scopes in Security > Manage API client access.
- D . Search the Google Workspace support forum for feedback about the app to include in the risk analysis report.
Your company has numerous locations throughout the world. Each of these locations has multiple office managers that field questions from employees through an email alias. Some questions have not been answered by an office manager.
How can you create a system to assign conversations to different receptionists using Workspace?
- A . Create a Google Groups Collaborative Inbox.
- B . Use App Script to design a ticketing system that marks conversation ownership.
- C . Contract with a third-party solution, such as ServiceNow.
- D . Create Google Tasks and assign them to receptionists to address unanswered questions.
You have configured Secure Transport (TLS) Compliance for all messages coming to and from an external domain. altostrat.com. that your end users communicate with via Gmail.
What will your end users experience when messages are delivered to them from altostrat.com without TLS enabled?
- A . The message will be delivered to their spam folder.
- B . The message will not be delivered to the end user in any form.
- C . The user will receive a failure message informing them that the message could not be delivered to their inbox and that they will need to work with their Workspace administrator to resolve the issue.
- D . A warning banner will appear on the message informing the user that the message was not sent securely.
Your company’s compliance officer has requested that you apply a content compliance rule that will reject all external outbound email that has any occurrence of credit card numbers and your company’s account number syntax, which is AccNo. You need to configure a content compliance rule to scan email to meet these requirements.
Which combination of attributes will meet this objective?
- A . Name the rule > select Outbound and Internal Sending > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject.
- B . Name the rule > select Outbound > select If ANY of the following match > add two expressions: one for Simple Content Match to find AccNo, and one for predefined content match to select Credit Card Numbers > choose Reject
- C . Name the rule > select Outbound and Internal Sending > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
- D . Name the rule > select Outbound > select If ALL of the following match > add two expressions: one for Advanced Content Match to find AccNo in the Body, and one for predefined content match to select Credit Card Numbers > choose Reject.
Your organization has a new security requirement around data exfiltration on iOS devices. You have a requirement to prevent users from copying content from a Google app (Gmail, Drive, Docs, Sheets, and Slides) in their work account to a Google app in their personal account or a third-party app.
What steps should you take from the admin panel to preventusers from copying data from work to personal apps on iOS devices? (Choose Two)
- A . Clear the "allow users to copy data to personal apps" checkbox.
- B . Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Data Protection Turn on "Advanced Mobile Management."
- C . Navigate to Devices > Mobile and Endpoint > iOS Settings > Data Sharing > Open Docs in Unmanaged Apps
- D . Clear the "allow items created with managed apps to open in unmanaged apps" checkbox.
A user is reporting that external, inbound messages from known senders are repeatedly being incorrectly classified as spam.
What steps should the admin take to prevent this behavior in the future?
- A . Modify the SPF record for your internal domain to include the IPs of the external user’s mail servers.
- B . Update the spam settings in the Admin Console to be less aggressive.
- C . Add the sender’s domain to an allowlist via approved senders in the Admin Console.
- D . Instruct the user to add the senders to their contacts.
The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management.
What should you do?
- A . Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
- B . Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of Google Workspace.
- C . Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
- D . Change Google Workspace release track to: Rapid Release for faster access to new features.
Your organization recently bought 1.000 licenses for Cloud Identity Premium. The company’s development team created an application in the enterprise service bus (ESB) that will read user data in the human resources information system (HRIS) and create accounts via the Google Directory REST API.
While doing the original test before production use, the team observes a 503 error coming from Google API response after a few users are created The team believes the ESB is not the cause, because it can perform 100 requests per second without any problems.
What advice would you give the development team in order to avoid the issue?
- A . Use the domain-wide delegation API to avoid the limitation per account.
- B . Use an exponential back-off algorithm to retry failed requests.
- C . Switch from REST API to gRPC protocol for performance improvement
- D . Use the batch request architecture, because it can pack 1,000 API calls in one HTTP request.
An employee at your organization is having trouble playing a video stored in Google Drive that is embedded in their Google Slides presentation You need to collect the necessary details to troubleshoot the issue.
What should you do?
- A . Confirm that the source video is in a supported format and resolution and that the user has permission to play the video Have a screen share session to confirm the behavior
- B . Instruct the employee to give you edit access to the presentation to review the revision history See if the error message changes when you delete and add the slides back
- C . Check the Google Drive audit logs for any error entries on the Slides presentation Check the help center for the appropriate error message
- D . Create a copy of the presentation to see if you can replicate the problem, and document any errors you see
Your organization deployed Google Workspace Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your Google Workspace organization.
What should you do?
- A . Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
- B . Use Work Insights to gather adoption metrics and target your training exercises.
- C . Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
- D . Use a script to monitor Email attachment types and target users that aren’t using Drive sharing.