Google Google Workspace Administrator Übungsprüfungen
Zuletzt aktualisiert am 06.05.2025- Prüfungscode: Google Workspace Administrator
- Prüfungsname: Professional Google Workspace Administrator
- Zertifizierungsanbieter: Google
- Zuletzt aktualisiert am: 06.05.2025
Your team is collaborating on a new project by using a Google Doc They are using Doc comments to add numerous questions and suggestions You want to ensure that sensitive data in the Doc comments does not appear in the recipients‘ inboxes when a user is notified that a comment has been assigned to them.
What should you do?
- A . Set up an email quarantine to quarantine all incoming emails that contain sensitive data
- B . Disable comments in the Google Doc for your users
- C . Create a Gmail content compliance rule and turn oft dynamic email for your team
- D . Create a Gmail content compliance rule to block incoming messages that contain sensitive data
A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
- A . Turn on password expiration.
- B . Enforce 2FA with a physical security key.
- C . Use a third-party identity provider.
- D . Enforce 2FA with Google Authenticator app.
You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no other users are experiencing issues signing in.
What could be causing the sign-in issue?
- A . The SAML assertion provided by the third-party IDP is presenting a username that conflicts with the current username configured in Google Workspace.
- B . The user’s Google password was changed administratively, which is causing a sign-in failure.
- C . The issued certificate for that user has been revoked and must be updated before the user can have another successful sign in.
- D . The SAML assertion is providing the user’s previous password attached to their old username.
Your organization wants to grant Google Vault access to an external regulatory authority. In an effort to comply with an investigation, the external group needs the ability to view reports in Google Vault.
What should you do?
- A . Create accounts for external users and assign Vault privileges.
- B . Share Vault access with external users.
- C . Assign an Archived User license to the external users.
- D . Temporarily assign the super admin role to the users
Your organization has decided to enforce 2-Step Verification for a subset of users. Some of these users are now locked out of their accounts because they did not set up 2-Step Verification by the enforcement date.
What corrective action should you take to allow the users to sign in again?
- A . Disable 2-Step Verification per organizational unit so the affected users can sign in.
- B . Move the affected users into the exception group temporarily so they can set up 2-Step
Verification, and then remove them from the exception group after successful sign-in is confirmed. - C . Disable 2-Step Verification organization-wide so all users can successfully sign in.
- D . Move the affected users into the exception group permanently so they do not have to use 2-Step Verification going forward.
Users in your organization are routinely complaining that they receive messages containing words of profanity they find inappropriate in a professional setting.
As the administrator what steps should you take to prevent the messages from being delivered to users mailboxes?
- A . Configure an objectionable content rule
- B . Configure an attachment compliance rule
- C . Enable optical character recognition (OCR)
- D . Set up a Gmail DLP policy.
Your company is using Google Workspace Business Plus edition, and the security team has reported several unsuccessful attempts to sign in to your Google Workspace domain from countries where you have no local employees. The affected accounts are from several executives in the main office.
You are asked to take measures to mitigate this security risk. Although budget is not a concern, your company prefers a minimal financial outlay to fix the issue, which you are tasked with managing.
Which two solutions would help you mitigate the risk at minimal cost? Choose 2 answers
- A . Deploy 2-Step Verification for all users who have security keys.
- B . Deploy Google Cloud Armor on a dedicated project, and create a rule to allow access to Google Workspace only from specific locations.
- C . Upgrade to Google Workspace Enterprise Plus for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.
- D . Subscribe to Cloud Identity Premium for all accounts, and define Context-Aware Access levels to only a list of countries where the company has employees.
- E . For all executives, create new accounts with random characters to match Google best practices, migrate data from the former accounts, and then delete them.
Your organization has users in the United States and Europe For compliance reasons you want to ensure that user data is always stored in the region where the user is located.
What should you do?
- A . Create two Google Groups titled "United States‘ and "Europe " Assign users to either group based on location
- B . Specify a data region policy for each Organizational Unit (OU) where users are grouped by location
- C . Populate the Address field on each user record ensuring the country information is accurate
- D . Do nothing No extra configuration is needed because user data is always stored in the region the user is located
Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.
What should you do?
- A . Use the conflict account remove tool to remove the accounts from Google Workspace.
- B . Rename the accounts to [email protected], and recreate the accounts.
- C . Ask users to request a new Google Workspace account from your local admin.
- D . Use the Transfer tool for unmanaged users to find the conflict accounts.
Users at your organization are reporting issues with Google Voice including disconnected calls and overall connection issues. You want to identify whether these issues affect just your organization or whether it’s a global Google issue.
What should you do?
- A . Use the Security Investigation Tool with Voice Log Events as the data source field In the search operator fields select Event is and Network Statistics (client) Analyze the packet loss
- B . Verify if there is a service outage for Google Voice reported on the Google Workspace Status Dashboard
- C . Use the Security investigation Tool with User Log Events as the data source field In the search operator fields select Event is and Call failed Analyze the packet loss
- D . Verify if there is a service interruption for Google Voice reported on the Google Workspace Updates Blog website