Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.What should you do?
Answer(s): A
Assess the Current State: Identify which users are using the @madeupcorp.com email addresses for services like AdSense, AdWords, and YouTube.Use the Transfer Tool for Unmanaged Users:Access Google Admin Console: Go to admin.google.com and sign in with your administrator account. Navigate to Tools: In the Admin console, go to "Tools" and then select "Transfer tool for unmanaged users."Enter Domain Information: Enter the domain name (madeupcorp.com) and verify the domain.List Unmanaged Users: The tool will generate a list of unmanaged users who are using their @madeupcorp.com email addresses.Send Transfer Requests: Send transfer requests to these users, prompting them to accept the transfer to the managed Google Workspace account.Follow Up: Ensure all users have accepted the transfer request to avoid any disruptions in accessing Google services with their corporate email addresses. Verify: Confirm that the transferred accounts are now managed under the Google Workspace domain.ReferenceGoogle Workspace Admin Help - Transfer tool for unmanaged users
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.What should you do?
Access Google Admin Console: Go to admin.google.com and sign in with your administrator account. Navigate to Email Settings: In the Admin console, go to "Apps" > "Google Workspace" > "Gmail" > "Spam, Phishing, and Malware".Select the Sales OU: Ensure you are configuring settings for the Sales OU specifically.Create a Blocked Senders List:Add Mass Email Sender Addresses: Enter the email addresses or domains of the mass email senders that the sales team finds distracting.Bypass for Constant Contact: Create a rule to bypass this blocked senders list for emails coming from Constant Contact. This can usually be done by setting up an exception rule within the same settings area.Apply and Save Settings: Ensure the settings are saved and propagated to the Sales OU.Verify Configuration: Send test emails to confirm that the Sales OU is filtering unwanted mass emails while still receiving those from Constant Contact.ReferenceGoogle Workspace Admin Help - Set up email controls for your organization Google Workspace Admin Help - Block or allow specific email addresses
Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Workspace data should be stored in a separate backup environment.How should you store data for this situation?
Answer(s): C
Evaluate Third-Party Backup Solutions: Identify third-party tools that offer secure backup solutions for Google Workspace. Examples include Backupify, Spanning Backup, and Afi.ai. Choose a Suitable Tool: Based on your organization's needs and compliance requirements, select a tool that offers robust data retention, secure storage, and easy recovery options.Set Up the Backup Solution:Create an Account: Sign up for the chosen third-party backup service. Configure Backup Settings: Link your Google Workspace account and configure the backup settings to meet your data retention policies.Schedule Backups: Set up regular backup schedules to ensure data is continuously backed up. Test Backups and Recovery: Perform initial backups and test the recovery process to ensure data can be retrieved efficiently when needed.Monitor and Maintain: Regularly monitor the backup status and maintain the system to comply with your organization's data retention regulations.ReferenceGoogle Workspace Admin Help - Choose a third-party backup tool Backupify - Google Workspace Backup
Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled.What two actions should you take to support the chief security officer's request? (Choose two.)
Answer(s): B,D
Create an Alert for External Sharing:Access Google Admin Console: Go to admin.google.com and sign in with your administrator account. Navigate to Rules: Go to "Security" > "Alert Center" > "Manage Rules". Create a New Rule: Select "Create Rule" and choose "Drive Audit" as the event source. Configure Rule Settings: Set the conditions to trigger alerts when files or folders are shared externally.Set Notification Preferences: Configure who should receive the alerts and how they should be notified.Save the Rule: Save and activate the rule to start receiving alerts on external sharing activities.Create a Custom Dashboard for External Sharing:Access Security Investigation Tool: In the Admin console, go to "Security" > "Investigation Tool". Create a New Investigation: Click "Create" and select "Drive" as the data source. Set Up Investigation Parameters: Define the parameters to track external sharing activities (e.g., file shared externally, users involved).Create Dashboard: Save the investigation as a custom dashboard to continuously monitor external sharing activities.Review and Monitor: Regularly review the dashboard and set up automated reports if necessary.ReferenceGoogle Workspace Admin Help - Create and manage alerts Google Workspace Admin Help - Use the security investigation tool
Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.What should you do?
Create a Google Group:Go to the Google Groups interface.Click on "Create Group."Enter the group name, email address (e.g., sales@company.com), and description.Configure Group Settings:After creating the group, go to "Group settings."Under "Permissions," set who can view topics, post, and join the group as per your requirement.Set Up Collaborative Inbox:In the Group settings, navigate to "Settings" > "Email options." Check the box for "Enable Collaborative Inbox."This option allows group members to assign topics, mark them as resolved, and categorize posts for better management.Assign Roles and Permissions:Define roles for members (e.g., Manager, Member).Assign permissions to allow various levels of access, such as viewing and managing conversations.Add Members:Add the employees who need access to this group.Go to "Manage members" and click "Add members."
Google Groups Collaborative InboxCreate and Configure Google Groups
Share your comments for Google GOOGLE-WORKSPACE-ADMINISTRATOR exam with other users:
could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
this is really very very helpful for mcd level 1
very helpful!
question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
thanks for the exact solution
need to refer the questions and have to give the exam
i need it right now if it was possible please
i need it very much please share it in the fastest time.
correct answer is d for student.java program
q:37 c is correct
q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
explained answers
plan to take theaws certified developer - associate dva-c02 in the next few weeks
very helpfull
good questions
help to practice csa exam
nice tip and well documented
i need the exam
please upload
prepping for fsc exam
pd1 with great experience
@t it seems like azure service bus message quesues could be the best solution
helpful to check your understanding.
question 128 the answer should be static not auto
more comments here
great support to appear for exams
useful dumps
making progress
q31 answer should be d i think
is this real?
q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
good questions with simple explanation
admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
very inciting