The latest Google Professional Google Workspace Administrator certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Google Professional Google Workspace Administrator exam and earn Google Professional Google Workspace Administrator certification.
Table of Contents
- Question 61
- Exam Question
- Correct Answer
- Explanation
- Reference
- Question 62
- Exam Question
- Correct Answer
- Reference
- Question 63
- Exam Question
- Correct Answer
- Reference
- Question 64
- Exam Question
- Correct Answer
- Explanation
- Reference
- Question 65
- Exam Question
- Correct Answer
- Explanation
- Reference
- Question 66
- Exam Question
- Correct Answer
- Reference
- Question 67
- Exam Question
- Correct Answer
- Reference
- Question 68
- Exam Question
- Correct Answer
- Explanation
- Reference
- Question 69
- Exam Question
- Correct Answer
- Reference
- Question 70
- Exam Question
- Correct Answer
- Explanation
- Reference
Question 61
Exam Question
You act as the Google Workspace Administrator for a company that has just acquired another organization. The acquired company will be migrated into your Workspace environment in 6 months. Management has asked you to ensure that the Google Workspace users you currently manage can efficiently access rich contact information in Workspace for all users. This needs to occur before the migration, and optimally without additional expenditure.
What step do you take to populate contact information for all users?
A. Provision and license Google Workspace accounts for the acquired company’s users because they will need accounts in the future.
B. Bulk-upload the contact information for these users via CSV into the Google Directory.
C. Prepare an uploadable file to be distributed to your end users that allows them to add the acquired company’s user contact information to their personal contacts.
D. Use the Domain Shared Contacts API to upload contact information for the acquired company’s users.
Correct Answer
D. Use the Domain Shared Contacts API to upload contact information for the acquired company’s users.
Explanation
The Domain Shared Contacts API lets your applications get and update external contacts that are shared with all users in a Google Workspace domain. Shared contacts are visible to all users of a Google Workspace domain and all Google services have access to the contact list.
Reference
Google Workspace > Admin console > Guides > Domain Shared Contacts API overview
Question 62
Exam Question
HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user’s email data to remain on hold. The terminated user’s team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user’s content is appropriately kept before provisioning their license to a new user.
What two actions should you take? (Choose two.)
A. Extend the legal hold on the user’s email data.
B. Rename the account to the new user starting next week.
C. Delete the account, freeing up a Google Workspace License.
D. Assign the terminated user account an Archive User license.
E. Move project files to a Team Drive or transfer ownership.
Correct Answer
D. Assign the terminated user account an Archive User license.
E. Move project files to a Team Drive or transfer ownership.
Reference
Google Workspace Admin Help > Delete or suspend users > Manage former employees and their data
Question 63
Exam Question
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.
What should you do?
A. Change Enrollment Permissions to only allow users in this organization to re-enroll existing devices.
B. Change Enrollment Controls to Place Chrome device in user organization.
C. Change Enrollment Controls to Keep Chrome device in current location.
D. Change Enrolment Permissions to not allow users in this organization to enroll new devices.
Correct Answer
B. Change Enrollment Controls to Place Chrome device in user organization.
Reference
Google Enterprise and Education Help > Cloud-managed Chrome Browser > Set Chrome policies for users or browsers > Device enrollment
Question 64
Exam Question
Your organization is concerned with the increasing threat of phishing attacks that may impact users.
Leadership has declined to force-enable 2-Step verification. You need to apply a security measure to prevent unauthorized access to user accounts.
What should you do?
A. Enable Enforce Strong Password policy.
B. Revoke token authorizations to external applications.
C. Enable Employee ID Login Challenge.
D. Decrease the Maximum User Session Length.
Correct Answer
C. Enable Employee ID Login Challenge.
Explanation
You can use employee IDs as a login challenge. Employee IDs are more difficult to guess and phish than other types of identity challenges. To use the employee ID login challenge, you need to make sure that IDs are associated with your users’ accounts.
Reference
Google Workspace Admin Help > Set up 2-Step Verification > Protect Google Workspace accounts with security challenges
Question 65
Exam Question
Your organization has just appointed a new CISO. They have signed up to receive admin alerts and just received an alert for a suspicious login attempt. They are trying to determine how frequently suspicious login attempts occur within the organization. The CISO has asked you to provide details for each user account that has had a suspicious login attempt in the past year and the number of times it occurred for each account.
What action should you take to meet these requirements?
A. Use the login audit report to export all suspicious login details for analysis.
B. Create a custom dashboard with the security investigation tool showing suspicious logins.
C. Create a custom query in BigQuery showing all suspicious login details.
D. Use the account activity report to export all suspicious login details for analysis.
Correct Answer
A. Use the login audit report to export all suspicious login details for analysis.
Explanation
Login audit log Track user sign-in activity You can use the Login audit log to track user sign-ins to your domain. You can review all sign-ins from web browsers. If a user signs in from an email client or a non-browser application, you can only review reports of suspicious attempts. Forward log event data to the Google Cloud Platform You can opt in to share the log event data with Google Cloud Platform. If you turn on sharing, data is forwarded to Cloud Logging, where you can query and view your logs, and control how you route and store your logs.
Reference
Google Workspace Admin Help > Reports and monitoring > Audit and investigation page > User log events
Question 66
Exam Question
When reloading Gmail in Chrome, the web browser returns a 500 Error. As part of the troubleshooting process, Google support asks you to gather logs.
How can this be accomplished?
A. Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”
B. Admin.google.com > Reporting > Reports > Apps Reports > Gmail
C. chrome://net-export > Start Logging to Disk > Confirm validity with https://netlog-viewer.appspot.com
D. Chrome > Window Context Menu > More Tools > Task Manager > Screen Capture List of Running Processes
Correct Answer
A. Chrome > Window Context Menu > More Tools > Developer Tools > Network Tab > Reload the page to replicate the error > “Export HAR”
Reference
chrome://settings/syncSetup
Question 67
Exam Question
You recently started an engagement with an organization that is also using Google Workspace. The engagement will involve highly sensitive data, and the data needs to be protected from being shared with unauthorized parties both internally and externally. You need to ensure that this data is properly secured.
Which configuration should you implement?
A. Create a Team Drive for this engagement, and limit the memberships and sharing settings.
B. Turn on external sharing with whitelisted domains, and add the external organization to the whitelist.
C. Provision accounts within your domain for the external users, and turn off external sharing for that Org.
D. Configure the Drive DLP rules to prevent the sharing of PII and PHI outside of your domain.
Correct Answer
A. Create a Team Drive for this engagement, and limit the memberships and sharing settings.
Reference
Google Workspace Learning Center > What are shared drives?
Question 68
Exam Question
Your company recently acquired an organization that was not leveraging Google Workspace. Your company is currently using Google Cloud Directory Sync (GCDS) to sync from an LDAP directory into Google Workspace. You want to deploy a second instance of GCDS and apply the same strategy with the newly acquired organization, which also has its users in an LDAP directory.
How should you change your GCDS instance to ensure that the setup is successful? (Choose two.)
A. Set up exclusion rules to ensure that users synced from the acquired organization’s LDAP are not, suspended.
B. Set up an additional instance of GCDS running on another server, and handle the acquired organization’s synchronization.
C. Upgrade to the multiple LDAP version of GCDS.
D. Add an LDAP sync rule to your current GCDS instance in order to synchronize new users.
E. Provide your current GCDS instance with admin credentials to the recently acquired organization’s LDAP directory.
Correct Answer
A. Set up exclusion rules to ensure that users synced from the acquired organization’s LDAP are not, suspended.
B. Set up an additional instance of GCDS running on another server, and handle the acquired organization’s synchronization.
Explanation
GCDS can only sync from a single LDAP directory. If you have multiple LDAP directories, it is recommended that you consolidate your LDAP server data into a single directory. You need to run 2 separate GCDS instances while creating exclusion rules to prevent suspensions/deletions.
Reference
Google Workspace Admin Help > Google Cloud Directory Sync > GCDS FAQ
Question 69
Exam Question
Your company is deploying Chrome devices. You want to make sure the machine assigned to the employee can only be signed in to by that employee and no one else.
What two things should you do? (Choose two.)
A. Disable Guest Mode and Public Sessions.
B. Enable a Device Policy of Sign In Screen and add the employee email address.
C. Enroll a 2-Factor hardware key on the device using the employee email address.
D. Enable a User Policy of Multiple Sign In Access and add just the employee email address.
E. Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.
Correct Answer
A. Disable Guest Mode and Public Sessions.
E. Enable a Device Policy of Restrict Sign In to List of Users, and add the employee email address.
Reference
Chrome Enterprise and Education Help > Manage policies for ChromeOS devices > Set ChromeOS device policies
Question 70
Exam Question
Your organization is using Password Sync to sync passwords from Active Directory to Google Workspace. A user changed their network password and cannot log in to Google Workspace with the new password. What steps should you take to troubleshoot this issue?
A. Reset the user’s password in Active Directory.
B. Confirm that the Password Sync service is running on all domain controllers.
C. Reinstall Password Sync on all domain controllers.
D. Reauthorize the Password Sync tool in the Google Workspace Admin Console.
Correct Answer
B. Confirm that the Password Sync service is running on all domain controllers.
Explanation
The network password is determined to be with AD. In this case, you must verify that password sync is installed on all domain controllers. This is the initial troubleshooting. After this troubleshooting, the logs of these connectors are taken.
Reference
Google Workspace Admin Help > Reset and recover passwords > Advanced password management > Sync passwords with Active Directory > 7. Have users change their AD passwords