Skip to Content

Google Professional Google Workspace Administrator Exam Questions and Answers – 1

The latest Google Professional Google Workspace Administrator certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Google Professional Google Workspace Administrator exam and earn Google Professional Google Workspace Administrator certification.

Question 61

Exam Question

You act as the Google Workspace Administrator for a company that has just acquired another organization. The acquired company will be migrated into your Workspace environment in 6 months. Management has asked you to ensure that the Google Workspace users you currently manage can efficiently access rich contact information in Workspace for all users. This needs to occur before the migration, and optimally without additional expenditure.

What step do you take to populate contact information for all users?

A. Provision and license Google Workspace accounts for the acquired company’s users because they will need accounts in the future.
B. Bulk-upload the contact information for these users via CSV into the Google Directory.
C. Prepare an uploadable file to be distributed to your end users that allows them to add the acquired company’s user contact information to their personal contacts.
D. Use the Domain Shared Contacts API to upload contact information for the acquired company’s users.

Correct Answer

D. Use the Domain Shared Contacts API to upload contact information for the acquired company’s users.

Explanation

The Domain Shared Contacts API lets your applications get and update external contacts that are shared with all users in a Google Workspace domain. Shared contacts are visible to all users of a Google Workspace domain and all Google services have access to the contact list.

Reference

Google Workspace > Admin console > Guides > Domain Shared Contacts API overview

Question 62

Exam Question

HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user’s email data to remain on hold. The terminated user’s team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user’s content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

A. Extend the legal hold on the user’s email data.
B. Rename the account to the new user starting next week.
C. Delete the account, freeing up a Google Workspace License.
D. Assign the terminated user account an Archive User license.
E. Move project files to a Team Drive or transfer ownership.

Correct Answer

D. Assign the terminated user account an Archive User license.
E. Move project files to a Team Drive or transfer ownership.

Reference

Google Workspace Admin Help > Delete or suspend users > Manage former employees and their data

Question 63

Exam Question

Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.

What should you do?

A. Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
B. Change Enrollment Controls to Place Chrome device in user organization.
C. Change Enrollment Controls to Keep Chrome device in current location.
D. Change Enrolment Permissions to not allow users in this organization to enroll new devices.

Correct Answer

B. Change Enrollment Controls to Place Chrome device in user organization.

Reference

Google Enterprise and Education Help > Cloud-managed Chrome Browser > Set Chrome policies for users or browsers > Device enrollment

Question 64

Exam Question

Your organization is concerned with the increasing threat of phishing attacks that may impact users.
Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.

What should you do?

A. Enable Enforce Strong Password policy.
B. Revoke token authorizations to external applications.
C. Enable Employee ID Login Challenge.
D. Decrease the Maximum User Session Length.

Correct Answer

C. Enable Employee ID Login Challenge.

Explanation

You can use employee IDs as a login challenge. Employee IDs are more difficult to guess and phish than other types of identity challenges. To use the employee ID login challenge, you need to make sure that IDs are associated with your users’ accounts.

Reference

Google Workspace Admin Help > Set up 2-Step Verification > Protect Google Workspace accounts with security challenges

Question 65

Exam Question

Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.

What action should you take to meet these requirements?

A. Use the login audit report to export all suspicious login details for analysis.
B. Create a custom dashboard with the security investigation tool showing suspicious logins.
C. Create a custom query in BigQuery showing all suspicious login details.
D. Use the account activity report to export all suspicious login details for analysis.

Correct Answer

A. Use the login audit report to export all suspicious login details for analysis.

Explanation

Login audit log Track user sign-in activity You can use the Login audit log to track user sign-ins to your domain. You can review all sign-ins from web browsers. If a user signs in from an email client or a non-browser application, you can only review reports of suspicious attempts. Forward log event data to the Google Cloud Platform You can opt in to share the log event data with Google Cloud Platform. If you turn on sharing, data is forwarded to Cloud Logging, where you can query and view your logs, and control how you route and store your logs.

Reference

Google Workspace Admin Help > Reports and monitoring > Audit and investigation page > User log events

Question 66

Exam Question

When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs.

How can this be accomplished?

A. Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”
B. Admin.google.com > Reporting > Reports > Apps Reports > Gmail
C. chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com
D. Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes

Correct Answer

A. Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”

Reference

chrome://settings/syncSetup

Question 67

Exam Question

You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.

Which configuration should you implement?

A. Create a Team Drive for this engagement, and limit the memberships and sharing settings.
B. Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
C. Provision accounts within your domain for the external users, and turn off external sharing for that Org.
D. Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.

Correct Answer

A. Create a Team Drive for this engagement, and limit the memberships and sharing settings.

Reference

Google Workspace Learning Center > What are shared drives?

Question 68

Exam Question

Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory.

How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)

A. Set up exclusion rules to ensure that users synced from the acquired organization’s LDAP are not, suspended.
B. Set up an additional instance of GCDS running on another server, and handle the acquired organization’s synchronization.
C. Upgrade to the multiple LDAP version of GCDS.
D. Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.
E. Provide your current GCDS instance with admin credentials to the recently acquired organization’s LDAP directory.

Correct Answer

A. Set up exclusion rules to ensure that users synced from the acquired organization’s LDAP are not, suspended.
B. Set up an additional instance of GCDS running on another server, and handle the acquired organization’s synchronization.

Explanation

GCDS can only sync from a single LDAP directory. If you have multiple LDAP directories, it is recommended that you consolidate your LDAP server data into a single directory. You need to run 2 separate GCDS instances while creating exclusion rules to prevent suspensions/deletions.

Reference

Google Workspace Admin Help > Google Cloud Directory Sync > GCDS FAQ

Question 69

Exam Question

Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else.

What two things should you do? (Choose two.)

A. Disable Guest Mode and Public Sessions.
B. Enable a Device Policy of Sign In Screen and add the employee email address.
C. Enroll a 2-Factor hardware key on the device using the employee email address.
D. Enable a User Policy of Multiple Sign In Access and add just the employee email address.
E. Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.

Correct Answer

A. Disable Guest Mode and Public Sessions.
E. Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.

Reference

Chrome Enterprise and Education Help > Manage policies for ChromeOS devices > Set ChromeOS device policies

Question 70

Exam Question

Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?

A. Reset the user’s password in Active Directory.
B. Confirm that the Password Sync service is running on all domain controllers.
C. Reinstall Password Sync on all domain controllers.
D. Reauthorize the Password Sync tool in the Google Workspace Admin Console.

Correct Answer

B. Confirm that the Password Sync service is running on all domain controllers.

Explanation

The network password is determined to be with AD. In this case, you must verify that password sync is installed on all domain controllers. This is the initial troubleshooting. After this troubleshooting, the logs of these connectors are taken.

Reference

Google Workspace Admin Help > Reset and recover passwords > Advanced password management > Sync passwords with Active Directory > 7. Have users change their AD passwords