$40

Google Workspace Deployment Services Technical Credential Answers

I want this!

Google Workspace Deployment Services Technical Credential Answers

$40

Google Workspace Deployment Services Technical Credential Answers


Questions:

  

[Configuring services] You need to set up email routing at Ink-42 so that emails sent to info@ink-42.com are automatically forwarded to both the sales and support teams. Which approach would be the most suitable?

Select the correct option, and then click Submit.

  • Use a third-party email routing service to manage incoming emails to info@ink-42.com.
  • Make info@ink-42.com a Google Group and add both the sales and support teams's groups as members of info@ink-42.com.
  • Set up individual email forwarding rules for each member of the sales and support teams.
  • Configure a mail alias for info@ink-42.com that points to the email addresses of the sales and support teams.
  • Create a Google Group for the sales and support teams and add it as a forwarding address for info@ink-42.com.

 

[Configuring services] Altostrat is migrating to Google Workspace and wants to follow Google recommended approach and maintain their legacy email system while gradually transitioning users. Which mail delivery architecture should they implement during this coexistence phase?

Select two that apply, and then click Submit.

  • Dual delivery
  • Hybrid delivery
  • Split delivery
  • Relay delivery
  • Direct delivery

 

==

 

[Managing Objects] At Altostrat, you need to create a resource calendar for a new conference room that can be booked by anyone in the company. Which steps should you take?

Select the correct option, and then click Submit.

  • Create a new resource calendar in the Admin Console and make it publicly bookable.
  • Create a new calendar in your own Google Calendar and share it with everyone.
  • Create a new Google Group for all employees and share your personal calendar with the group.
  • Utilize a third-party room booking system and integrate it with Google Calendar.

 

[Supporting business initiatives] Ink-42 wants to gain insights into how employees are adopting and utilizing Google Workspace tools. Which report would provide this information?

Select the correct option, and then click Submit.

  • Activity reports
  • Work Insights
  • Alert Center
  • BigQuery
  • Audit logs

 

[Supporting business initiatives] Ink-42 is planning a Google Workspace Transformation Lab to foster innovation and process improvement. Which of the following statements best describes the primary objective of this workshop?

Select the correct option, and then click Submit.

  • To develop a detailed communication plan for the Google Workspace rollout
  • To identify an executive sponsor who can champion the change and drive adoption
  • To have diverse participants to collaboratively reimagine work processes and explore innovative solutions
  • To analyze the organization's current workflows and identify potential areas for improvement
  • To provide comprehensive training on all Google Workspace features and functionalities

 

[Data access and authentication] You need to restrict external sharing of files in a specific shared drive at Ink-42 to only users within a particular domain. How can you accomplish this?

Select the correct option, and then click Submit.

  • Use Drive labels to mark files as restricted and apply sharing limitations
  • Create a Google Group for the allowed domain and share the drive with the group
  • Disable external sharing for the entire organization
  • Implement a data loss prevention (DLP) rule to block external sharing
  • Modify the shared drive's sharing settings to allow only specific domains

 

[Configuring services] Ink-42 wants to ensure that all Google Meet recordings are stored in a specific region for compliance reasons. How can you enforce this?

Select the correct option, and then click Submit.

  • Apply data region policies to restrict data storage location.
  • Use organizational unit (OU) settings to control recording location for different departments.
  • Configure the default recording location in Google Meet settings.
  • Use Google Workspace APIs to automatically move recordings to the desired region after they are created.
  • Rely on Google Workspace's default data storage practices.

 

[Configuring services] Altostrat wants to allow certain employees to install Google Workspace Marketplace applications, but only after they are approved by the IT department. How can you configure this?

Select the correct option, and then click Submit.

  • Create a custom admin role with limited Marketplace access and assign it to specific users.
  • Enable Marketplace access for all users and use App access control to allow only trusted apps.
  • Enable Marketplace access for all users and use security settings to block unapproved apps.
  • Disable Marketplace access for all users and manually install approved apps for specific users.
  • Configure approval workflows for Marketplace apps, requiring IT department review before installation.

 

[Managing Objects] Managers at Ink-42 want to delegate access to their calendar to their assistants, allowing the assistants to schedule and manage appointments on their behalf. How can you achieve this?
Select the correct option, and then click Submit.

  • Instruct the managers to share their calendar with assistants granting "Make changes and manage sharing" permission.
  • Set up an email filter to automatically forward the manager's meeting invitations to the assistant.
  • Instruct managers to share their calendar with assistants granting "Make changes to events" permission.
  • Create a shared calendar for the manager and the assistant and grant both of them full access.
  • Add the assistant as a delegate to the manager's calendar in the Admin Console.

 

[Managing Objects] During the Core IT phase of a Google Workspace deployment, what is the recommended approach for handling group mail flow and member expansion?

Select the correct option, and then click Submit.

  • Keep group expansion on the legacy system
  • Move group expansion to Google Workspace
  • Use a hybrid approach with both legacy and Google Workspace expansion
  • Disable group expansion entirely during this phase
  • Provision groups as shared contacts in Google Workspace

 

[Managing Objects] Ink-42's security policy mandates that user accounts of employees on extended leave be temporarily deactivated. What is Google recommended approach to achieve this in Google Workspace?

Select the correct option, and then click Submit.

  • Change the passwords of the user accounts and store them securely.
  • Suspend the user accounts, ensuring they can be reactivated later.
  • Delete the user accounts and recreate them when the employees return.
  • Set an automatic expiration date for the user accounts to be deactivated after a specified period.
  • Transfer ownership of the user accounts to a temporary administrator.

 

[Managing Objects] You need to change the primary email address for a large number of users at Altostrat due to a company rebranding. What's the most efficient way to accomplish this?

Select the correct option, and then click Submit.

  • Write an Apps Script to automate the email address changes
  • Instruct users to change their own email addresses
  • Export user data, modify it in a spreadsheet, and re-import it
  • Use the Google Workspace bulk user update tool
  • Manually update each user's email address in the Admin Console

 

[Managing Objects] Altostrat wants to ensure that user accounts are automatically deactivated in Google Workspace when employees leave the company. Which approach aligns with Google's recommended practices for user de-provisioning?

Select the correct option, and then click Submit.

  • Rely on the default Google Workspace account expiration settings
  • Manually delete user accounts in the Google Admin Console as soon as employees leave
  • Transfer ownership of departing employees' Drive data to their managers before de-provisioning
  • Schedule a periodic GCDS sync to remove deactivated accounts from Google Workspace
  • Configure a custom script to suspend user accounts based on triggers from the HR system

 

[Managing Objects] You notice discrepancies between your on-premises Active Directory and Google Workspace user data after a GCDS sync. Which tools or methods can you use to troubleshoot and gain insights on why this mismatch is occurring?

Select two that apply, and then click Submit.

  • Manually comparing user lists in both directories
  • GCDS configuration file
  • Google Admin Console audit logs
  • Google Cloud Logging
  • Google Workspace APIs

 

[Managing Objects] During an audit at Altostrat, you discover several active user accounts that haven't been accessed in over a year. What actions should you take to address this security risk?

Select the correct option, and then click Submit.

  • Delete the inactive accounts immediately
  • Review the access permissions associated with the inactive accounts
  • Suspend the accounts
  • Transfer ownership of the inactive accounts to a designated administrator
  • Reset the passwords for the inactive accounts

 

[Configuring services] A manager at Ink-42 wants their assistant to be able to send emails on their behalf from their Gmail account. How can you configure this?

Select the correct option, and then click Submit.

  • Create a shared inbox for the manager and the assistant.
  • Use a third-party email delegation tool to manage access.
  • Share the manager's Gmail account password with the assistant.
  • Enable email delegation for the manager's account and grant access to the assistant.
  • Set up an email forwarding rule to automatically forward the manager's emails to the assistant.

 

[Configuring services] Altostrat wants to prevent users from sending emails containing offensive language. Which mail routing control would be most effective in addressing this?

Select the correct option, and then click Submit.

  • Content compliance with objectionable content filter
  • User training on appropriate email communication
  • Outbound gateway with profanity filtering
  • Routing rules to quarantine emails with offensive language
  • DLP rule to block emails with sensitive content

 

[Configuring services] You need to grant a specific user at Altostrat the ability to manage security settings in the Admin Console without giving them full administrative privileges. Which approach is the most appropriate?

Select the correct option, and then click Submit.

  • Create a custom role with the desired security related settings permissions
  • Delegate the "Security Administrator" role to the user
  • Share the admin console login credentials with the user
  • Assign the user the "Super Admin" role

 

[Configuring services] Ink-42 has acquired a smaller company and wants to integrate their Google Workspace environment. You need to migrate the acquired company's users into Ink-42's Google Workspace while preserving their existing data and permissions. Which approach would be the most suitable?

Select the correct option, and then click Submit.

  • Set up a trust relationship between the two domains and allow cross-domain access.
  • Merge the two Google Workspace domains into a single domain.
  • Use Google Workspace tools to migrate users and data.
  • Manually recreate each user account and transfer data individually.
  • Export the acquired company's data and import it into Ink-42's Google Workspace.

 

[Troubleshooting] Altostrat wants to prevent unauthorized users from sending emails that appear to be from the company domain. Which email authentication protocol should you implement to achieve this?

Select two that apply, and then click Submit.

  • DKIM
  • TLS
  • MTA-STS
  • SPF
  • MFA

 

[Data access and authentication] You're investigating a potential security incident at Altostrat where an unauthorized user gained access to sensitive data in Google Drive. The audit logs show that the access occurred through a third-party application. What action should you take FIRST to mitigate the risk?

Select the correct option, and then click Submit.

  • Implement stricter app access control settings
  • Revoke the third-party app's access to Google Workspace
  • Contact the app developer to report the security vulnerability
  • Disable external sharing for all Google Drive files
  • Reset the passwords for all affected user accounts

 

[Data access and authentication] Ink-42 is concerned about the potential for phishing attacks and unauthorized access to their Google Workspace accounts. They want to implement the most secure two-step verification (2SV) method available. Which 2SV method should they enforce for all users?

Select the correct option, and then click Submit.

  • Push notifications
  • SMS codes
  • Security keys
  • Google Authenticator app
  • Backup codes

 

[Data access and authentication] Ink-42 permits employees to use their personal Android devices for work-related activities. You need to implement security measures that specifically protect corporate data on these devices, while minimizing restrictions on personal device usage. Which two actions would best achieve this balance?

Select two that apply, and then click Submit.

  • Disable camera access on personal devices.
  • Restrict installation of third-party apps.
  • Remotely wipe corporate data if the device is lost or stolen.
  • Enable device-level encryption to protect data at rest.
  • Require work profile or company-owned device management for accessing corporate data.

 

[Data access and authentication] Altostrat is using a third-party SAML Identity Provider (IdP) for Google Workspace SSO. They want to ensure that even if a user's IdP credentials are compromised, their Google Workspace account remains protected. What additional security measure should they implement?

Select two that apply, and then click Submit.

  • Enforce complex password policies on the IdP
  • Enable Google's two-step verification (2SV) after successful IdP authentication
  • Implement context-aware access policies
  • Restrict access to Google Workspace from specific IP addresses
  • Disable third-party app access for all users

 

[Supporting business initiatives] You want to set up alerts at Ink-42 to notify the IT team whenever a user shares a file containing sensitive information externally. Which Google Workspace feature would you leverage?

Select the correct option, and then click Submit.

  • Audit logs
  • Alert Center
  • Work Insights
  • DLP tools
  • Activity reports

 

[Supporting business initiatives] Ink-42 wants to analyze employee engagement and collaboration patterns within Google Workspace. They have a large volume of historical data stored in various logs and reports. Which tool would be best suited for performing advanced data analysis and visualization on this data?

Select the correct option, and then click Submit.

  • Work Insights
  • Alert Center
  • Audit logs
  • BigQuery
  • Activity reports

 

[Supporting business initiatives] The Google Workspace Customer Success Methodology emphasizes a phased approach to deployment. Which of the following are primary benefits of this approach compared to a single, all-at-once deployment?

Select two that apply, and then click Submit.

  • Reduces project risks and promotes a smoother transition.
  • Facilitates comprehensive testing and validation of technical configurations.
  • Allows for iterative feedback and adjustments to the deployment project based on learnings from each phase.
  • Simplifies the process of data migration and minimizes potential data loss.
  • Accelerates the overall deployment timeline.

 

[Supporting business initiatives] Altostrat is experiencing an outage with Gmail. You need to monitor the progress of the issue and communicate updates to affected users. Which Google Workspace tool would be best suited for this?

Select the correct option, and then click Submit.

  • Alert Center
  • Work Insights
  • Google Workspace Status Dashboard
  • Audit logs
  • Activity reports

 

[Supporting business initiatives] Altostrat wants to migrate a large volume of Gmail data between two Google Workspace accounts. Which two approaches could be more appropriate for this task?

Select two that apply, and then click Submit.

  • Use Google Takeout to export and import data between the accounts
  • Manually forward emails from one account to the other
  • Set up IMAP sync between the two accounts
  • Utilize migration tools
  • Hire Google Workspace Domain Transfer from Google Cloud Professional Services

 

[Configuring services] Altostrat's compliance team requires all emails sent by or to the Finance department to be retained for 7 years. How can you configure this in Google Workspace?

Select the correct option, and then click Submit.

  • Use Google Vault to set up a custom retention policy for "Finance" organizational unit (OU) and make sure that Finance department's employees are placed on that OU.
  • Automate export and archive financial emails using Google Workspace migration tools.
  • Use Google Vault to set up a default retention policy for all emails.
  • Configure a custom email routing rule to archive financial emails.
  • Create a Gmail label for financial emails and apply a retention rule to it.

 

[Managing Objects] Altostrat's HR department has requested an automated process for onboarding new employees into Google Workspace. Which of the following methods would be the most scalable for a large number of new hires?
Select the correct option, and then click Submit.

  • Sending individual invitations to new employees to join Google Workspace.
  • Leveraging Google Workspace APIs to provision user accounts programmatically.
  • Manually creating each new user account in the Admin Console.
  • Using GCDS to synchronize user accounts from an on-premises Active Directory.
  • Creating a pre-configured template for new user accounts and applying it manually.

 

[Managing Objects] Ink-42's legal team requires a shared drive where only they have full access, but other departments can view specific files on a need-to-know basis. How can you configure this?

Select the correct option, and then click Submit.

  • Create a shared drive with the legal team as managers and use content-based access control to restrict access to sensitive files.
  • Create a shared drive with the legal team as managers and share individual files or folders with other departments as needed.
  • Create a shared drive with the legal team as managers and add other departments as viewers.
  • Create separate shared drives for each department and share relevant files with the legal team.
  • Create a shared drive with the legal team as the only members and provide external sharing links to specific files for other departments.

 

[Supporting business initiatives] Altostrat's compliance team wants to delegate the responsibility of managing legal holds to a specific group of users. How can you achieve this in Vault?

Select the correct option, and then click Submit.

  • Assign the "eDiscovery Manager" role to the group members
  • Grant "Make changes and manage sharing" permissions to the group on all relevant matters
  • Share the Vault administrator credentials with the group
  • Create a custom admin role with Manage Holds permission
  • Manually add the group members as collaborators to each legal hold

 

[Managing Objects] You want to grant a new IT administrator at Altostrat the ability to manage user accounts but restrict their access to other services' settings. Which of the following are secure ways to achieve this?

Select two that apply, and then click Submit.

  • Assign the new administrator the "Super Admin" role.
  • Implement two-factor authentication for the new administrator's account.
  • Create a custom role with specific privileges for user management.
  • Share the billing account details with the new administrator separately.
  • Assign the new administrator the "User Management Admin" role .

 

[Managing Objects] Some employees at Altostrat are unable to send emails to a specific Google Group. What could be the likely causes of this issue?

Select two that apply, and then click Submit.

  • The employees are not members of the group and and posting is restriced to members only.
  • The employees' accounts have sending restrictions in place.
  • The group's email address is incorrect.
  • The group is set to "Announcement-only" and they are not managers of the group.
  • The group has reached its maximum storage limit.

 

[Configuring services] You discover a potential security threat in Altostrat's Google Workspace environment through a Security Health Analytics check. The check indicates that several users have shared sensitive documents externally. What's the most appropriate remediation action?

Select the correct option, and then click Submit.

  • Disable external sharing for the entire organization.
  • Revoke external sharing permissions for all sensitive documents.
  • Implement data loss prevention (DLP) rules to prevent future unauthorized sharing.
  • Suspend the users accounts involved in such leakage.
  • Educate users about secure sharing practices.

 

===

 

[Managing Objects] Altostrat has a complex organizational structure with multiple departments and subsidiaries. They want to implement granular control over Google Workspace service settings and policies for different user groups. Which approach would best address this requirement?

Select the correct option, and then click Submit.

  • Combine the use of OUs and Google Groups strategically to achieve the desired level of granularity
  • Implement a third-party identity management solution for fine-grained access control
  • Create a large number of organizational units (OUs) in Google Workspace to mirror the company structure
  • Utilize Google Groups extensively to manage user access and permissions
  • Rely on a single OU structure and apply policies globally

 

[Managing Objects] Altostrat is in the Early Adopters phase of their Google Workspace deployment. They want to start using Google Groups for calendar invitations and drive sharing within this user group. What action should they take regarding group expansion?

Select the correct option, and then click Submit.

  • Delay group provisioning until the Global Go-Live phase
  • Create separate groups for calendar and drive sharing
  • Use a hybrid approach with both legacy and Google Workspace expansion
  • Ensure group membership is fully populated before switching the MX record to Gmail
  • Keep group expansion on the legacy system

 

[Managing Objects] An employee at Ink-42 is leaving the company. You need to ensure their Google Drive data is transferred to their manager before their account is deleted. What are the appropriate actions to take?
Select two that apply, and then click Submit.

  • Suspend the employee's account to prevent further access before finally deleting it.
  • Transfer ownership of all employee's files to the manager and then delete the employee's account.
  • Share all the employee's Drive files with the manager and then delete the employee's account.
  • Download all the employee's Drive data to your local machine and then upload it to the manager's Drive.
  • Ask the employee to manually move all their Drive data to the manager's Drive before leaving.

 

[Managing Objects] Altostrat wants to ensure that user accounts are automatically deactivated in Google Workspace when employees leave the company. Which approach aligns with Google's recommended practices for user de-provisioning?

Select the correct option, and then click Submit.

  • Schedule a periodic GCDS sync to remove deactivated accounts from Google Workspace
  • Rely on the default Google Workspace account expiration settings
  • Configure a custom script to suspend user accounts based on triggers from the HR system
  • Transfer ownership of departing employees' Drive data to their managers before de-provisioning
  • Manually delete user accounts in the Google Admin Console as soon as employees leave

 

[Managing Objects] You're configuring GCDS for Ink-42 and want to synchronize only users from specific organizational units (OUs) in their Active Directory. What is the easiest way to achieve this?

Select the correct option, and then click Submit.

  • Configure GCDS to sync against a specific OU container in Active Directory
  • Modify the Active Directory schema to add a custom attribute for GCDS filtering
  • Manually create user accounts in Google Workspace for users in the desired OUs
  • Use GCDS exclusion rules to filter out users from unwanted OUs
  • Implement a third-party identity management solution to control user provisioning

 

[Managing Objects] You are troubleshooting a GCDS synchronization issue at Ink-42 where some user accounts are not being updated in Google Workspace despite changes in Active Directory. Which action would be the most appropriate first step in diagnosing the problem?

Select the correct option, and then click Submit.

  • Review the GCDS logs and settings for potential errors or misconfigurations
  • Restart the GCDS service on the server to trigger a fresh synchronization
  • Check the Google Cloud Logging for detailed synchronization logs and error messages
  • Contact Google Workspace support for immediate assistance
  • Manually update the affected user accounts in the Google Admin Console

 

[Managing Objects] You are configuring Google Cloud Directory Sync (GCDS) for a new Google Workspace customer. They have a complex Active Directory structure with numerous organizational units (OUs). What is the recommended approach for OU synchronization with Google Workspace?

Select the correct option, and then click Submit.

  • Create a separate, simplified OU structure in Google Workspace for managing service settings and policies
  • Avoid synchronizing OUs altogether and rely solely on Google Groups for access control
  • Manually replicate the Active Directory OU structure in Google Workspace
  • Synchronize all OUs from Active Directory to Google Workspace
  • Use a third-party tool to map Active Directory OUs to Google Workspace OUs

 

[Managing Objects] Altostrat, a multinational corporation, wants to implement a Google Workspace environment that allows its various subsidiaries and regional offices to maintain their distinct branding while still facilitating centralized administration and seamless collaboration. Which domain architecture would BEST address these requirements?

Select the correct option, and then click Submit.

  • A hybrid approach combining single and multiple Admin Consoles
  • A single Admin Console with only user alias domains
  • Multiple Google Workspace Admin Consoles
  • Single Admin Console with a single primary domain
  • Single Admin Console with multiple domains

 

[Configuring services] Ink-42 wants to implement a policy where all emails sent from their domain to external recipients are automatically routed through a third-party email security service for additional filtering and analysis. Which mail routing configuration would best suited to achieve this?

Select the correct option, and then click Submit.

  • Content compliance
  • External gateways
  • Outbound gateways
  • Default routing
  • Routing

 

[Configuring services] Altostrat wants to implement a policy where employees in the "Finance" organizational unit (OU) have stricter sharing permissions in Google Drive compared to other departments. Which approach would be the most suitable?

Select the correct option, and then click Submit.

  • Use Google Groups to manage Drive access for the Finance OU members.
  • Create a separate shared drive for the Finance OU and apply stricter sharing settings.
  • Apply a Drive label to all files created by Finance OU members and enforce sharing restrictions based on the label.
  • Modify the OU settings for the Finance OU to override the default Drive sharing permissions.
  • Create a custom admin role for the Finance OU with limited Drive sharing permissions.

 

[Configuring services] Altostrat has recently migrated from Microsoft Exchange to Google Workspace. Some employees still need to access their old Exchange emails through Outlook. Which configuration should you implement?

Select the correct option, and then click Submit.

  • Set up a hybrid Exchange/Google Workspace environment.
  • Provide a webmail interface for accessing old Exchange emails.
  • Set up GWSMO only for those users.
  • Configure IMAP access for Outlook to connect to Gmail.
  • Set up GWMMO only for those users.

 

[Configuring services] Altostrat wants to implement a policy where all outgoing emails from their domain are digitally signed to prevent spoofing and enhance deliverability. Which email authentication protocols should they configure?

Select the correct option, and then click Submit.

  • MTA-STS
  • DMARC
  • DKIM
  • SPF
  • TLS

 

[Configuring services] You've noticed a significant increase in spam emails reaching Altostrat employees' inboxes. Which Gmail spam control measures can you implement to address this issue?

Select two that apply, and then click Submit.

  • Increase the spam filter sensitivity in Gmail settings.
  • Enable an inbound gateway to filter incoming emails before they reach Gmail.
  • Educate employees about identifying and reporting spam emails.
  • Set up an IP allowlist to only accept emails from trusted IP addresses.
  • Configure a denylist to block emails from specific senders or domains.

 

[Configuring services] Altostrat's legal team needs to ensure that all emails related to a specific legal matter are retained for a period of 5 years, even if users delete them from their inboxes. Which Google Workspace feature should they utilize to achieve this?

Select the correct option, and then click Submit.

  • Email archiving
  • Google Vault retention rules
  • Data loss prevention (DLP)
  • Content compliance rules
  • Gmail retention policies

 

[Configuring services] Altostrat wants to ensure that emails sent from their domain are protected against unauthorized modification during transit. Which email authentication protocol primarily focuses on ensuring message integrity?

Select the correct option, and then click Submit.

  • TLS
  • SPF
  • MTA-STS
  • DMARC
  • DKIM

 

[Troubleshooting] You discover that an employee at Ink-42 has fallen victim to a phishing attack and their Google account has been compromised. What immediate actions should you take to mitigate the damage?

Select two that apply, and then click Submit.

  • Notify the security team about the incident
  • Revoke all third-party app access for the employee's account
  • Reset the employee's password
  • Delete the employee's account
  • Review the Admin Console audit logs for suspicious activity

 

[Troubleshooting] Users at Ink-42 are experiencing intermittent issues accessing Google Drive. Some users report slow loading times, while others are unable to upload or download files. What are the potential causes of this problem?

Select two that apply, and then click Submit.

  • Conflicting browser extensions
  • Network connectivity issues
  • Issues with the Google Drive sync client
  • Insufficient storage quota in Google Drive
  • Browser compatibility problems

 

[Troubleshooting] Altostrat has noticed an increase in phishing emails targeting their executives. These emails attempt to impersonate the CEO and request urgent wire transfers. What security measures can you implement to protect against such attacks?

Select two that apply, and then click Submit.

  • Configure email allowlists for executive accounts
  • Implement two-factor authentication for all user accounts
  • Enable advanced phishing and malware protection in Gmail
  • Block all emails from external domains
  • Train employees on how to identify and report phishing attempts

 

[Troubleshooting] Ink-42 employees are complaining about missing attachments in emails they receive. The attachments are present when the sender checks the sent folder. What's the most likely cause of this issue?

Select the correct option, and then click Submit.

  • The emails are being routed through a third-party service that's stripping attachments.
  • Ink-42 has implemented an attachment filter that's blocking certain file types.
  • The sender's email client is experiencing a temporary glitch.
  • The recipients' email clients are configured to block attachments.
  • The recipients have accidentally deleted the attachments.

 

[Troubleshooting] Altostrat is experiencing slow performance across multiple Google Workspace applications. You suspect a network issue. Which log file type would be most helpful in diagnosing the problem?

Select the correct option, and then click Submit.

  • Google Admin Console audit logs
  • Google Cloud Logging
  • HAR files
  • Chrome browser logs
  • Gmail logs

 

[Troubleshooting] A user at Ink-42 reports receiving an email that appears to be from their bank, asking them to update their account information. You suspect this is a phishing attempt. Which Google tool would you use to analyze the email headers and confirm its legitimacy?

Select the correct option, and then click Submit.

  • Google Vault
  • Message Header Analyzer
  • Google Security Command Center
  • Google Admin Console audit logs
  • Gmail search operators

 

[Troubleshooting] Altostrat's legal team needs to review all emails sent and received by a specific employee over the past month. Which Google Workspace tool would you use to facilitate this?

Select the correct option, and then click Submit.

  • Google Takeout
  • Google Drive audit logs
  • Gmail search
  • Google Cloud Logging
  • Google Vault

 

[Troubleshooting] You receive a high-priority alert in the Google Workspace Alert Center indicating a potential data exfiltration attempt. The alert details a large number of files downloaded from a shared drive by an external user. What is the FIRST action you should take?

Select the correct option, and then click Submit.

  • Review the shared drive's access logs and user activity.
  • Revoke the external user's access to the shared drive.
  • Disable external sharing for the entire organization.
  • Immediately contact the security team to initiate an incident response.
  • Assess the sensitivity of the downloaded files.

 

[Troubleshooting] A group of users at Altostrat is suddenly unable to access their Gmail accounts. You suspect an issue with their organizational unit (OU) settings. How would you investigate and resolve this?

Select two that apply, and then click Submit.

  • Contact Google Workspace support for assistance
  • Temporarily move the affected users to a different OU
  • Check the OU settings to ensure Gmail is enabled for the affected users
  • Review the Admin Console audit logs for any recent changes to the OU
  • Reset the passwords for the affected users

 

[Data access and authentication] Ink-42 has several service accounts used for various automation tasks within Google Workspace. You want to ensure that these service accounts are only granted the minimum necessary permissions to perform their functions. How can you achieve this?

Select the correct option, and then click Submit.

  • Regularly review and revoke unnecessary API scopes for each service account
  • Disable all API access for service accounts
  • Store service account credentials in a publicly accessible location
  • Use strong passwords for service account authentication
  • Assign the "Super Admin" role to all service accounts

 

[Data access and authentication] Ink-42 wants to deploy a new Chrome extension to all employees in the marketing department. What's the most efficient way to achieve this?

Select the correct option, and then click Submit.

  • Manually install the extension on each employee's Chrome browser
  • Use Group Policy to push the extension to marketing department computers
  • Create a custom Chrome extension and deploy it through the Chrome Web Store
  • Share the extension link with the marketing department and ask them to install it themselves
  • Configure Chrome Browser management from Admin Console to automatically install the extension for the marketing OU

 

[Data access and authentication] Altostrat wants to provide a seamless login experience for employees using Windows 10 devices while maintaining security. Which Google Workspace feature would best achieve this?

Select the correct option, and then click Submit.

  • ChromeOS device policy settings
  • Google Credential Provider for Windows (GCPW)
  • Endpoint Verification
  • Context-aware access policies
  • Chrome Browser Cloud Management

 

[Data access and authentication] Altostrat wants to ensure that employees can only access corporate data from managed devices. Which Google Workspace feature would be the most suitable for enforcing this requirement?

Select the correct option, and then click Submit.

  • Advanced device management
  • ChromeOS device policy settings
  • Chrome user and browser policy settings
  • Google Credential Provider for Windows (GCPW)
  • Context-aware access policies

 

[Data access and authentication] Altostrat wants to use their existing identity provider (IdP) for single sign-on (SSO) to Google Workspace. Which protocol should they configure to achieve this?

Select the correct option, and then click Submit.

  • Kerberos
  • OpenID Connect
  • OAuth 2.0
  • SAML
  • LDAP

 

[Data access and authentication] Altostrat wants to implement a data governance policy that classifies files in Google Drive based on their sensitivity level. Which feature should you configure to achieve this?

Select the correct option, and then click Submit.

  • Gmail DLP
  • Context-aware access policies
  • Client-side encryption
  • Drive labels
  • Shared drive permissions

 

[Data access and authentication] Ink-42 is implementing a zero-trust security model and wants to restrict access to Google Workspace services based on user context and device security posture. Which Google Workspace feature would be most suitable for this purpose?

Select the correct option, and then click Submit.

  • API Controls
  • OAuth 2.0 scopes
  • DLP tools
  • Client-side encryption
  • Context-aware access policies

 

[Data access and authentication] You are configuring Gmail DLP at Ink-42 to identify and protect personally identifiable information (PII). Which data types would typically be considered PII?

Select two that apply, and then click Submit.

  • Email addresses
  • Department
  • Job titles
  • Product names
  • Social security numbers

 

[Data access and authentication] At Altostrat, you're concerned about the potential risks associated with Super Admin accounts. You want to ensure that these accounts are used responsibly and securely. Which two practices align with Google's recommendations for Super Admin account management?

Select two that apply, and then click Submit.

  • Disable two-factor authentication for Super Admin accounts to streamline their workflow
  • Limit the number of Super Admin accounts to a select few individuals
  • Share Super Admin account credentials with multiple IT team members for easy access
  • Regularly review and audit Super Admin account activity
  • Use Super Admin accounts for everyday tasks like creating user accounts or managing email settings

 

[Data access and authentication] Ink-42 wants to implement a policy that restricts access to sensitive Google Drive files based on the user's network location and device security status. Which Google Workspace feature would enable this?

Select the correct option, and then click Submit.

  • Company-owned device management for Android and iOS
  • Basic device management
  • Endpoint Verification
  • Chrome user and browser policy settings
  • Context-aware access policies

 

[Supporting business initiatives] Altostrat has identified a group of enthusiastic employees who are eager to promote Google Workspace adoption within their teams. How can you best leverage these individuals to facilitate a smooth transition?

Select the correct option, and then click Submit.

  • Offer them incentives or rewards for their active participation
  • Include them in the decision-making process for future Google Workspace feature rollouts
  • Empower them as Google Guides to provide peer-to-peer support on Go Live day and advocacy
  • Assign them additional administrative responsibilities in the Google Admin Console
  • Enroll them in advanced Google Workspace training programs and communication

 

[Supporting business initiatives] During the Early Adopters phase, which of the following is crucial to ensure the effectiveness of the change management plan?

Select the correct option, and then click Submit.

  • Including a representative sample of the organization, encompassing various departments, roles, and locations.
  • Limiting the Early Adopters group to a small, manageable number of users.
  • Delaying any training or communication efforts until after the Global Go-Live phase.
  • Focusing solely on one department to make sure their experience is successful and then replicate the formula to other departments during Global Go Live.

 

[Supporting business initiatives] Ink-42 needs to provide a subset of emails from a specific custodian to an external legal counsel for review. Which two Vault action could be considered appropriate for this scenario?

Select two that apply, and then click Submit.

  • Place a legal hold on the custodian's mailbox
  • Run an audit report on the custodian's email activity
  • Export the relevant emails from the custodian's mailbox
  • Grant the external counsel direct access to the Matter
  • Search for specific keywords within the custodian's mailbox

 

[Supporting business initiatives] Ink-42 has just signed a statement of work to deploy Google Workspace and is eager to start the transition. Which phase should be initiated first to ensure a smooth and successful project launch?

Select the correct option, and then click Submit.

  • Global Go-Live, to get everyone on board as quickly as possible and make sure the excitement and momentum about the change is not lost
  • Enable, to start planning and preparing for the broader deployment
  • Assess & Plan, to conduct a detailed analysis of current systems and processes, mapping impacts and risks of the change
  • Early Adopters, to primarily validate change management assets by gathering user feedback and acts as a sort of rehearsal for the Global Go-Live
  • Core IT, to primarily confirm technical assumptions and better familiarize customer's IT staff with the Google Workspace platform

 

[Supporting business initiatives] Altostrat's legal team requires all emails related to a specific ongoing lawsuit to be preserved indefinitely. Which Vault feature should you configure to fulfill this requirement?

Select the correct option, and then click Submit.

  • Legal holds
  • Custom retention rules
  • Audit reports
  • Export matters
  • Retention rules

 

[Supporting business initiatives] The success of a Google Workspace deployment depends heavily on securing buy-in and active involvement from leadership. What are the key benefits of establishing a strong Sponsorship and Engagement foundation?

Select two that apply, and then click Submit.

  • Minimizes the need for training and communication efforts
  • Creates a sense of urgency and motivates employees to embrace the change
  • Ensures adequate resources and budget allocation for the project
  • Accelerates the technical migration process
  • Provides a clear vision and direction for the transformation initiative

 

 More certification answers in english: https://en.certificationanswers.com/exams-answers/

I want this!
Size
386 KB
Length
26 pages
Copy product URL
No refunds allowed