Google Professional Google Workspace Administrator - Professional Google Workspace Administrator Exam

Question #6 (Topic: Exam A)
Your organization has enabled spoofing protection against unauthenticated domains. You are receiving complaints that email from multiple partners is not being received. While investigating this issue, you find that emails are all being sent to quarantine due to the configured safety setting. What should be the next step to allow uses to review these emails and reduce the internal complaints while keeping your environment secure?
A. Add your partner domains IPs to the Inbound Gateway setting. B. Change the spoofing protection to deliver the emails to spam instead of quarantining them. C. Add your partner sending IP addresses to an allowlist. D. Change the spoofing protection to deliver the emails to inboxes with a custom warning instead of quarantining them.
Answer: B
Question #7 (Topic: Exam A)
As the Workspace Administrator, you have been asked to delete a temporary Google Workspace user account in the marketing department. This user has created Drive documents in My Documents that the marketing manager wants to keep after the user is gone and removed from Workspace. The data should be visible only to the marketing manager. As the Workspace Administrator, what should you do to preserve this user's Drive data?
A. In the user deletion process, select “Transfer” in the data in other apps section and add the manager's email address. B. Use Google Vault to set a retention period on the OU where the users reside. C. Before deleting the user, add the user to the marketing shared drive as a contributor and move the documents into the new location. D. Ask the user to create a folder under MyDrive, move the documents to be shared, and then share that folder with the marketing team manager.
Answer: A
Question #8 (Topic: Exam A)
As a Google Workspace administrator for your organization, you are tasked with controlling which third-party apps can access Google Workspace data. Before implementing controls, as a first step in this process, you want to review all the third-party apps that have been authorized to access Workspace data. What should you do?
A. Open Admin Console > Security > API Controls > App Access Control > Manage Third Party App Access. B. Open Admin Console > Security > API Controls > App Access Control > Manage Google Services. C. Open Admin Console > Security > Less Secure Apps. D. Open Admin Console > Security > API Controls > App Access Control > Settings.
Answer: A
Question #9 (Topic: Exam A)
Your organization wants more visibility into actions taken by Google staff related to your data for audit and security reasons. They are specifically interested in understanding the actions performed by Google support staff with regard to the support cases you have opened with Google. What should you do to gain more visibility?
A. From Google Admin Panel, go to Audit, and select Access Transparency Logs. B. From Google Admin Panel, go to Audit, and select Login Audit Log. C. From Google Admin Panel, go to Audit, and select Rules Audit Log. D. From Google Admin Panel, go to Audit, and select Admin Audit Log.
Answer: A
Question #10 (Topic: Exam A)
Your organization recently had a sophisticated malware attack that was propagated through embedded macros in email attachments. As a Workspace administrator, you want to provide an additional layer of anti-malware protection over the conventional malware protection that is built into Gmail. What should you do to protect your users from future unknown malware in email attachments?
A. Run queries in Security Investigation Tool. B. Turn on advanced phishing and malware protection. C. Enable Security Sandbox. D. Enable Gmail confidential mode.
Answer: C
Download Exam
Page: 2 / 31
Total 151 questions