The latest Google Professional Google Workspace Administrator certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Google Professional Google Workspace Administrator exam and earn Google Professional Google Workspace Administrator certification.
Table of Contents
- Question 31
- Exam Question
- Correct Answer
- Reference
- Question 32
- Exam Question
- Correct Answer
- Reference
- Question 33
- Exam Question
- Correct Answer
- Reference
- Question 34
- Exam Question
- Correct Answer
- Explanation
- Reference
- Question 35
- Exam Question
- Correct Answer
- Explanation
- Reference
- Question 36
- Exam Question
- Correct Answer
- Reference
- Question 37
- Exam Question
- Correct Answer
- Question 38
- Exam Question
- Correct Answer
- Reference
- Question 39
- Exam Question
- Correct Answer
- Question 40
- Exam Question
- Correct Answer
- Reference
Question 31
Exam Question
Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them.
How could you provide granular insight into what data third party applications are accessing?
What should you do?
A. Create a report using the OAuth Token Audit Activity logs.
B. Create a report using the Calendar Audit Activity logs.
C. Create a report using the Drive Audit Activity logs.
D. Create a reporting using the API Permissions logs for Installed Apps.
Correct Answer
A. Create a report using the OAuth Token Audit Activity logs.
Reference
Google Workspace Admin Help > Reports and monitoring > Audit and investigation pageOAuth log events
Question 32
Exam Question
Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail.
What should you do to protect your users from future unknown malware in email attachments?
A. Run queries in Security Investigation Tool.
B. Turn on advanced phishing and malware protection.
C. Enable Security Sandbox.
D. Enable Gmail confidential mode.
Correct Answer
B. Turn on advanced phishing and malware protection.
Reference
Google Workspace Admin Help > Advanced Gmail management > Advanced Gmail security > Advanced phishing and malware protection
Question 33
Exam Question
Your company has just received a shipment of ten Chromebooks to be deployed across the company, four of which will be used by remote employees. In order to prepare them for use, you need to register them in Google Workspace.
What should you do?
A. Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.
B. In Chrome Management | Device Settings, enable Forced Re-enrollment for all devices.
C. Turn on the chromebook and log in as a Chrome Device admin. Press Ctrl+Alt+E to begin enterprise enrollment.
D. Instruct the employees to log in to the Chromebook. Upon login, the auto enrollment process will begin.
Correct Answer
A. Turn on the Chromebook and press Ctrl+Alt+E at the login screen to begin enterprise enrollment.
Reference
Chrome Enterprise and Education Help > Sign up and get started > ChromeOS device Quick Start > 5. Enroll ChromeOS devices
Question 34
Exam Question
Your organization wants more visibility into actions taken by Google staff related to your data for audit and security reasons. They are specifically interested in understanding the actions performed by Google support staff with regard to the support cases you have opened with Google.
What should you do to gain more visibility?
A. From Google Admin Panel, go to Audit, and select Access Transparency Logs.
B. From Google Admin Panel, go to Audit, and select Login Audit Log.
C. From Google Admin Panel, go to Audit, and select Rules Audit Log.
D. From Google Admin Panel, go to Audit, and select Admin Audit Log.
Correct Answer
D. From Google Admin Panel, go to Audit, and select Admin Audit Log.
Explanation
Google staff logs related to accessing user content are stored in Access Transparency logs.
Reference
Google Workspace Admin Help > Reports and monitoring > Audit and investigation page > Admin log events
Question 35
Exam Question
A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network.
Where should you enable this in the Chrome management settings?
A. Randomly scatter auto-updates.
B. Update over cellular.
C. Disable Auto update.
D. Throttle the bandwidth.
Correct Answer
A. Randomly scatter auto-updates.
Explanation
Randomly scatter auto-updates over Only available if you choose to scatter updates Specifies the approximate number of days that managed Chrome devices download an update after its release. You can use this setting to avoid causing traffic spikes in old or low-bandwidth networks. Devices that are offline during this period download the update when they’re online again.
Reference
Chrome Enterprise and Education Help > Manage policies for ChromeOS devices > Manage updates on ChromeOS devices
Question 36
Exam Question
As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data.
What should you do?
A. Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.
B. Open Admin Console > Security > API Controls > App Access Control > Manage Google Services.
C. Open Admin Console > Security > Less Secure Apps.
D. Open Admin Console > Security > API Controls > App Access Control > Settings.
Correct Answer
A. Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access.
Reference
Google Account Help > Manage your account permissions > Manage third-party apps & services with access to your account
Question 37
Exam Question
The CEO of your company heard about new security and collaboration features and wants to know how to stay up to date. You are responsible for testing and staying up to date with new features, and have been asked to prepare a presentation for management.
What should you do?
A. Download the Google Workspace roadmap, and work together with a deployment specialist for new features.
B. Create a support ticket for the Google Workspace roadmap, and ask to enable the latest release of Google Workspace.
C. Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
D. Change Google Workspace release track to: Rapid Release for faster access to new features.
Correct Answer
C. Subscribe to the Google Workspace release calendar, and Join the Google Cloud Connect Community.
Question 38
Exam Question
As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager.
As the Workspace Administrator, what should you do to preserve this user’s Drive data?
A. In the user deletion process, select “Transfer” in the data in other apps section and add the manager’s email address.
B. Use Google Vault to set a retention period on the OU where the users reside.
C. Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.
D. Ask the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.
Correct Answer
C. Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location.
Reference
- Google Workspace Admin Help > Delete or suspend users > Delete or remove a user from your organization
- Google Workspace Admin Help > Use your Admin console > Manage Google Workspace from Android > Manage user accounts from an Android device
Question 39
Exam Question
A recent legal investigation requires all emails and Google Drive documents from a specific user to be retrieved.
As the administrator, how can you fulfill the legal team’s request?
A. Use Security Investigation Tool to Search Google Drive events for all of the user’s documents, and use Google Admin > Reports > Email Log Search to find their emails.
B. Search Google Drive for all of the user’s documents, and ask them to forward all of their emails.
C. Use the Gmail API and Google Drive API to automatically collect and export data.
D. Utilize Google Vault to hold, search, and export data of interest.
Correct Answer
D. Utilize Google Vault to hold, search, and export data of interest.
Question 40
Exam Question
Your organization has enabled spoofing protection against unauthenticated domains. You are receiving complaints that email from multiple partners is not being received. While investigating this issue, you find that emails are all being sent to quarantine due to the configured safety setting.
What should be the next step to allow uses to review these emails and reduce the internal complaints while keeping your environment secure?
A. Add your partner domains IPs to the Inbound Gateway setting.
B. Change the spoofing protection to deliver the emails to spam instead of quarantining them.
C. Add your partner sending IP addresses to an allowlist.
D. Change the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.
Correct Answer
D. Change the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.
Reference
Learn > Microsoft 365 > Microsoft Defender for Office 365 > Anti-spoofing protection in EOP