Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An employee with a Workspace Business Plus license at your company is going on a long leave soon. The employee will not need access to their Google Workspace data, but their teammates will need access to the employee’s data. When the employee returns from leave, you will need to restore access to theiraccount, data, emails, and shared documents. You need to preserve the employee’s Workspace data while also minimizing cost while they are on leave. What should you do?

A.

Suspend their account in the Admin console.

B.

Purchase an Archived User license and assign the license to the employee.

C.

Export the account data by using Takeout, and remove the user license in the Admin console.

D.

Copy the employee’s emails, and transfer their file ownership to a teammate. Delete the user account.

Your organization needs an approval application for purchases where a user can enter information on the purchase required and then submit it for management approval. You need to suggest a solution to create the application that must be available on both the web and mobile devices. Your organization does not have software developers or the budget to hire a third party. What should you do?

A.

Suggest that the organization develop an application internally with a database, a backend service for data retrieval, and a frontend service for the application's user interface.

B.

Suggest that the organization continue to approve requests manually until budget is available to use a third-party application provider.

C.

Suggest the organization use AppSheet to create the application.

D.

Suggest that the organization use AppScript to create forms linked to a Google Sheet to store the purchase data.

An employee at your organization may be sharing confidential documents with unauthorized external parties. You must quickly determine if any sensitive information has been leaked. What should you do?

A.

Review the employee's Drive log events in the security investigation tool.

B.

Audit Drive access by using the Admin SDK Reports API.

C.

Review the employee's user log events within the security investigation tool.

D.

Create a custom report of the user's external sharing by using the security dashboard.

The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?

A.

Instruct the IT department to directly access and forward the relevant emails to the legal department.

B.

Temporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.

C.

Ask a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.

D.

Use Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

A team of temporary employees left your organization after completing a shared project. Per company policy, you need to disable their Google Workspace accounts while preserving all project data and related communications in Google Vault for a minimum of two years. You want to comply with this policy while minimizing cost. What should you do?

A.

Purchase and assign Archived User licenses to the former employees.

B.

Transfer the former employees' files and data to active user accounts. Delete the former employees' Workspace accounts.

C.

Purchase additional user licenses and suspend the former employees' accounts.

D.

Move the former employees to their own organizational unit (OU) and disable access to Google services for that OU.

Your company’s help desk is receiving technical support tickets from employees who report that messages from known external contacts are being sent to the spam label in Gmail. You need to correct the issue and ensure delivery of legitimate emails without introducing additional risk as soon as possible. What should you do?

A.

Ask employees to select the messages in Gmail that are being delivered to spam and mark them as Not spam.

B.

Contact the external senders, and tell them to authenticate their sent mail by using domain-based message authentication, reporting, and conformance (DMARC).

C.

Turn off more aggressive spam filtering in spam policies that are applied to the users’ organizational unit and add the senders’ mail system IP addresses to the email allowlist.

D.

Create an address list of approved senders so messages from these users bypass Gmail’s spam filters and recipients can decide whether they are spam or not.

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

Your organization acquired a small agency. You need to create user accounts for these new employees. The new users must be able to use their new organization’s email address and their email address with the sub-agency domain name. What should you do?

A.

Redirect the acquired domain to Google’s MX records and add the account as a “send as” address.

B.

Set up the acquired agency as a secondary domain from the Manage domains page.

C.

Set up the acquired agency as a user alias domain from the Manage domains page.

D.

Set up the acquired agency as a secondary domain and swap it to the primary domain.