Google Professional Workspace Administrator GOOGLE-WORKSPACE-ADMINISTRATOR Exam Questions in PDF

Free Google GOOGLE-WORKSPACE-ADMINISTRATOR Dumps Questions (page: 5)

Security and Compliance has identified that data is being leaked through a third-party application connected to Google Workspace. You want to investigate using an audit log.

What log should you use?

  1. Admin audit log
  2. SAML audit log
  3. Drive usage audit log
  4. OAuth Token audit log

Answer(s): D

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com. Security Settings: Navigate to Security > Access and Data Control > API controls.
Audit Log:
Click on "OAuth Token Audit Log".
Review the log entries for any suspicious third-party applications that have access to your Google Workspace data.

Investigate:
Identify and investigate any suspicious activities or applications listed in the audit log. Revoke access to any untrusted third-party applications.
Reference
Google Workspace Admin: View OAuth Token audit log



Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.

What should you do?

  1. Enable additional security verification via email.
  2. Enable authentication via the Google Authenticator.
  3. Deploy browser or device certificates via Google Workspace.
  4. Configure USB Yubikeys for all users.

Answer(s): B

Explanation:

2-Step Verification (2SV):
2-Step Verification adds an extra layer of security by requiring users to verify their identity using a second factor in addition to their password. This helps protect against unauthorized access, even if the password is compromised.
Google Authenticator:
Google Authenticator is a mobile app that generates time-based one-time passcodes (TOTP) for 2SV. It works even when the device is offline, providing a secure and reliable second factor for authentication.
Implementation Steps:
Enable 2-Step Verification:
Go to the Google Admin console (admin.google.com).

Navigate to Security > Authentication > 2-Step Verification.
Turn on 2-Step Verification for the organization.
Deploy Google Authenticator:
Instruct users to download the Google Authenticator app from their respective app stores (iOS or Android).
Provide guidance on setting up Google Authenticator with their Google Workspace accounts. Users will scan a QR code provided during the setup process to link their account with the Authenticator app.
Advantages of Google Authenticator:
Security: It provides a highly secure method of 2-step verification as the codes are generated on the user's device and change every 30 seconds.
Ease of Use: It's easy to set up and use, with a straightforward user interface.

Offline Functionality: Codes can be generated even without internet access, ensuring consistent access to 2SV codes.
Why Other Options Are Less Suitable:
A . Enable additional security verification via email:
Email-based verification is less secure than app-based 2SV because email accounts can be more easily compromised.
C . Deploy browser or device certificates via Google Workspace:
While device certificates add security, they are typically used for device management and access control rather than for 2-step verification purposes.
D . Configure USB Yubikeys for all users:
USB Yubikeys are highly secure and suitable for 2SV, but they require physical distribution and management of hardware tokens, which can be logistically complex and costly. Given the context of disabled peripheral access, this option might contradict the policy of the Chief Information Security Officer.


Reference:

Google Workspace Admin Help: Set up 2-Step Verification Google Workspace Security: 2-Step Verification



A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:

Control password policies.
Make corporate apps available to the users.
Remotely wipe the device if it's lost or compromised

What two steps are required before configuring the device policies? (Choose two.)

  1. Turn on Advanced Mobile Management for the domain.
  2. Turn on Advanced Mobile Management for Sales OU
  3. Set up Device Approvals.
  4. Set up an Apple Push Certificate.
  5. Deploy Apple Certificate to every device.

Answer(s): B,D

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com.
Enable Advanced Mobile Management for Sales OU:
Navigate to Devices > Mobile & endpoints > Settings.
Select the Sales OU and turn on Advanced Mobile Management.
Set Up an Apple Push Certificate:
Go to Devices > Mobile & endpoints > Apple certificates.

Follow the instructions to obtain and upload an Apple Push Certificate.
Device Policies:
After setting up the Apple Push Certificate, configure the desired device policies such as password policies, app distribution, and remote wipe capabilities.
Reference
Google Workspace Admin: Set up advanced mobile management Google Workspace Admin: Set up an Apple Push Certificate



Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts.
When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in Google Workspace Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error.

What should you do?

  1. Install Google Cloud Directory Sync on all Domain Controllers.
  2. Install Google Workspace Sync for Microsoft Outlook on all employees' computers.
  3. Install Google Cloud Directory Sync on a supported server.
  4. Install Google Apps Manager to automate add-user scripts.

Answer(s): C

Explanation:

Prepare Environment: Ensure you have a supported server to install Google Cloud Directory Sync (GCDS).
Download GCDS:
Download Google Cloud Directory Sync from the Google Workspace Downloads page.
Install GCDS:
Follow the installation instructions provided by Google to install GCDS on the server.
Configuration:
Configure GCDS to synchronize user data from Active Directory to Google Workspace.

Set up synchronization rules and schedules to ensure that user data is kept up to date automatically.
Testing and Deployment:
Test the synchronization to ensure that new user accounts are created accurately in Google Workspace.
Deploy GCDS in the production environment after successful testing.
Reference
Google Workspace Admin: About Google Cloud Directory Sync Google Workspace Admin: Install and Set Up GCDS



A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network.

Where should you enable this in the Chrome management settings?

  1. Randomly scatter auto-updates.
  2. Update over cellular.
  3. Disable Auto update.
  4. Throttle the bandwidth.

Answer(s): A

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com. Devices Management: Navigate to Devices > Chrome > Settings.
Configuration:
Under the "Chrome management" section, select "User & browser settings". Choose the organizational unit where you want to apply this setting.
Auto-Updates Settings:
Scroll down to the "Auto-update settings" section.
Enable the "Randomly scatter auto-updates" option. This setting will spread out the updates over a period of time, reducing the load on your network.
Save Changes: Click "Save" to apply the changes.
Reference
Google Workspace Admin: Manage automatic updates



Share your comments for Google GOOGLE-WORKSPACE-ADMINISTRATOR exam with other users:

B
Bhagiii
11/4/2023 7:04:00 AM

well explained.

R
Rahul
8/8/2023 9:40:00 PM

i need the pdf, please.

C
CW
7/11/2023 2:51:00 PM

a good source for exam preparation

A
Anchal
10/23/2023 4:01:00 PM

nice questions

J
J Nunes
9/29/2023 8:19:00 AM

i need ielts general training audio guide questions

A
Ananya
9/14/2023 5:16:00 AM

please make this content available

S
Swathi
6/4/2023 2:18:00 PM

content is good

L
Leo
7/29/2023 8:45:00 AM

latest dumps please

L
Laolu
2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.

Z
Zaynik
9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer

M
Massam
6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump

A
Anonymous
12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.

J
Japles
5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.

F
Faritha
8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures

A
Anonymous
9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

A
Ann
9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks

S
Sridhar
1/16/2024 9:19:00 PM

good questions

S
Summer
10/4/2023 9:57:00 PM

looking forward to the real exam

V
vv
12/2/2023 2:45:00 PM

good ones for exam preparation

D
Danny Zas
9/15/2023 4:45:00 AM

this is a good experience

S
SM 1211
10/12/2023 10:06:00 PM

hi everyone

A
A
10/2/2023 6:08:00 PM

waiting for the dump. please upload.

A
Anonymous
7/16/2023 11:05:00 AM

upload cks exam questions

J
Johan
12/13/2023 8:16:00 AM

awesome training material

P
PC
7/28/2023 3:49:00 PM

where is dump

Y
YoloStar Yoloing
10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.

Z
Zelalem Nega
5/14/2023 12:45:00 PM

please i need if possible h12-831,

AI Tutor 👋 I’m here to help!