Google Professional Google Workspace Administrator Exam (page: 1)
Google Professional Workspace Administrator
Updated on: 25-Sep-2025

Madeupcorp.com is in the process of migrating from a third-party email system to Google Workspace. The VP of Marketing is concerned that her team already administers the corporate AdSense, AdWords, and YouTube channels using their @madeupcorp.com email addresses, but has not tracked which users have access to which service. You need to ensure that there is no disruption.

What should you do?

  1. Run the Transfer Tool for Unmanaged users.
  2. Use a Google Form to survey the Marketing department users.
  3. Assure the VP that there is no action required to configure Google Workspace.
  4. Contact Google Enterprise Support to identify affected users.

Answer(s): A

Explanation:

Assess the Current State: Identify which users are using the @madeupcorp.com email addresses for services like AdSense, AdWords, and YouTube.
Use the Transfer Tool for Unmanaged Users:
Access Google Admin Console: Go to admin.google.com and sign in with your administrator account. Navigate to Tools: In the Admin console, go to "Tools" and then select "Transfer tool for unmanaged users."
Enter Domain Information: Enter the domain name (madeupcorp.com) and verify the domain.

List Unmanaged Users: The tool will generate a list of unmanaged users who are using their @madeupcorp.com email addresses.
Send Transfer Requests: Send transfer requests to these users, prompting them to accept the transfer to the managed Google Workspace account.
Follow Up: Ensure all users have accepted the transfer request to avoid any disruptions in accessing Google services with their corporate email addresses. Verify: Confirm that the transferred accounts are now managed under the Google Workspace domain.
Reference
Google Workspace Admin Help - Transfer tool for unmanaged users



Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.

What should you do?

  1. Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
  2. Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
  3. Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
  4. Create an approved senders list at the Market Research OU that contains the mass email sender addresses.

Answer(s): A

Explanation:

Access Google Admin Console: Go to admin.google.com and sign in with your administrator account. Navigate to Email Settings: In the Admin console, go to "Apps" > "Google Workspace" > "Gmail" > "Spam, Phishing, and Malware".
Select the Sales OU: Ensure you are configuring settings for the Sales OU specifically.
Create a Blocked Senders List:
Add Mass Email Sender Addresses: Enter the email addresses or domains of the mass email senders that the sales team finds distracting.
Bypass for Constant Contact: Create a rule to bypass this blocked senders list for emails coming from Constant Contact. This can usually be done by setting up an exception rule within the same settings area.
Apply and Save Settings: Ensure the settings are saved and propagated to the Sales OU.

Verify Configuration: Send test emails to confirm that the Sales OU is filtering unwanted mass emails while still receiving those from Constant Contact.
Reference
Google Workspace Admin Help - Set up email controls for your organization Google Workspace Admin Help - Block or allow specific email addresses



Your organization is part of a highly regulated industry with a very high turnover. In order to recycle licenses for new employees and comply with data retention regulations, it has been determined that certain Google Workspace data should be stored in a separate backup environment.

How should you store data for this situation?

  1. Use routing rules to dual-deliver mail to an on-premises SMTP server and Google Workspace.
  2. Write a script and use Google Workspace APIs to access and download user data.
  3. Use a third-party tool to configure secure backup of Google Workspace data.
  4. Train users to use Google Takeout and store their archives locally.

Answer(s): C

Explanation:

Evaluate Third-Party Backup Solutions: Identify third-party tools that offer secure backup solutions for Google Workspace. Examples include Backupify, Spanning Backup, and Afi.ai. Choose a Suitable Tool: Based on your organization's needs and compliance requirements, select a tool that offers robust data retention, secure storage, and easy recovery options.
Set Up the Backup Solution:
Create an Account: Sign up for the chosen third-party backup service. Configure Backup Settings: Link your Google Workspace account and configure the backup settings to meet your data retention policies.
Schedule Backups: Set up regular backup schedules to ensure data is continuously backed up. Test Backups and Recovery: Perform initial backups and test the recovery process to ensure data can be retrieved efficiently when needed.
Monitor and Maintain: Regularly monitor the backup status and maintain the system to comply with your organization's data retention regulations.
Reference
Google Workspace Admin Help - Choose a third-party backup tool Backupify - Google Workspace Backup



Your organization is on Google Workspace Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other Google Workspace customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled.

What two actions should you take to support the chief security officer's request? (Choose two.)

  1. Review who has viewed files using the Google Drive Activity Dashboard.
  2. Create an alert from Drive Audit reports to notify of external file sharing.
  3. Review total external sharing in the Aggregate Reports section.
  4. Create a custom Dashboard for external sharing in the Security Investigation Tool.
  5. Automatically block external sharing using DLP rules.

Answer(s): B,D

Explanation:

Create an Alert for External Sharing:
Access Google Admin Console: Go to admin.google.com and sign in with your administrator account. Navigate to Rules: Go to "Security" > "Alert Center" > "Manage Rules". Create a New Rule: Select "Create Rule" and choose "Drive Audit" as the event source. Configure Rule Settings: Set the conditions to trigger alerts when files or folders are shared externally.
Set Notification Preferences: Configure who should receive the alerts and how they should be notified.
Save the Rule: Save and activate the rule to start receiving alerts on external sharing activities.
Create a Custom Dashboard for External Sharing:
Access Security Investigation Tool: In the Admin console, go to "Security" > "Investigation Tool". Create a New Investigation: Click "Create" and select "Drive" as the data source. Set Up Investigation Parameters: Define the parameters to track external sharing activities (e.g., file shared externally, users involved).
Create Dashboard: Save the investigation as a custom dashboard to continuously monitor external sharing activities.
Review and Monitor: Regularly review the dashboard and set up automated reports if necessary.
Reference
Google Workspace Admin Help - Create and manage alerts Google Workspace Admin Help - Use the security investigation tool



Your organization's Sales Department uses a generic user account (sales@company.com) to manage requests. With only one employee responsible for managing the departmental account, you are tasked with providing the department with the most efficient means to allow multiple employees various levels of access and manage requests from a common email address.

What should you do?

  1. Configure a Google Group as an email list.
  2. Delegate email access to department employees.
  3. Configure a Google Group as a collaborative inbox.
  4. Configure a Google Group, and set the Access Level to Announcement Only.

Answer(s): C

Explanation:

Create a Google Group:
Go to the Google Groups interface.
Click on "Create Group."
Enter the group name, email address (e.g., sales@company.com), and description.

Configure Group Settings:
After creating the group, go to "Group settings."
Under "Permissions," set who can view topics, post, and join the group as per your requirement.
Set Up Collaborative Inbox:
In the Group settings, navigate to "Settings" > "Email options." Check the box for "Enable Collaborative Inbox."
This option allows group members to assign topics, mark them as resolved, and categorize posts for better management.
Assign Roles and Permissions:
Define roles for members (e.g., Manager, Member).
Assign permissions to allow various levels of access, such as viewing and managing conversations.
Add Members:
Add the employees who need access to this group.
Go to "Manage members" and click "Add members."


Reference:

Google Groups Collaborative Inbox
Create and Configure Google Groups



Viewing Page 1 of 41



Share your comments for Google Professional Google Workspace Administrator exam with other users:

surya 7/30/2023 2:02:00 PM

please upload c_sacp_2308
CANADA


Sasuke 7/11/2023 10:30:00 PM

please upload the dump. thanks very much !!
Anonymous


V 7/4/2023 8:57:00 AM

good questions
UNITED STATES


TTB 8/22/2023 5:30:00 AM

hi, could you please update the latest dump version
Anonymous


T 7/28/2023 9:06:00 PM

this question is keep repeat : you are developing a sales application that will contain several azure cloud services and handle different components of a transaction. different cloud services will process customer orders, billing, payment, inventory, and shipping. you need to recommend a solution to enable the cloud services to asynchronously communicate transaction information by using xml messages. what should you include in the recommendation?
NEW ZEALAND


Gurgaon 9/28/2023 4:35:00 AM

great questions
UNITED STATES


wasif 10/11/2023 2:22:00 AM

its realy good
UNITED ARAB EMIRATES


Shubhra Rathi 8/26/2023 1:12:00 PM

oracle 1z0-1059-22 dumps
Anonymous


Leo 7/29/2023 8:48:00 AM

please share me the pdf..
INDIA


AbedRabbou Alaqabna 12/18/2023 3:10:00 AM

q50: which two functions can be used by an end user when pivoting an interactive report? the correct answer is a, c because we do not have rank in the function pivoting you can check in the apex app
GREECE


Rohan Limaye 12/30/2023 8:52:00 AM

best to practice
Anonymous


Aparajeeta 10/13/2023 2:42:00 PM

so far it is good
Anonymous


Vgf 7/20/2023 3:59:00 PM

please provide me the dump
Anonymous


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous


CiscoStudent 11/15/2023 5:29:00 AM

in question 272 the right answer states that an autonomous acces point is "configured and managed by the wlc" but this is not what i have learned in my ccna course. is this a mistake? i understand that lightweight aps are managed by wlc while autonomous work as standalones on the wlan.
Anonymous


pankaj 9/28/2023 4:36:00 AM

it was helpful
Anonymous


User123 10/8/2023 9:59:00 AM

good question
UNITED STATES


vinay 9/4/2023 10:23:00 AM

really nice
Anonymous


Usman 8/28/2023 10:07:00 AM

please i need dumps for isc2 cybersecuity
Anonymous


Q44 7/30/2023 11:50:00 AM

ans is coldline i think
UNITED STATES


Anuj 12/21/2023 1:30:00 PM

very helpful
Anonymous


Giri 9/13/2023 10:31:00 PM

can you please provide dumps so that it helps me more
UNITED STATES


Aaron 2/8/2023 12:10:00 AM

thank you for providing me with the updated question and answers. this version has all the questions from the exam. i just saw them in my exam this morning. i passed my exam today.
SOUTH AFRICA


Sarwar 12/21/2023 4:54:00 PM

how i can see exam questions?
CANADA


Chengchaone 9/11/2023 10:22:00 AM

can you please upload please?
Anonymous


Mouli 9/2/2023 7:02:00 AM

question 75: option c is correct answer
Anonymous


JugHead 9/27/2023 2:40:00 PM

please add this exam
Anonymous


sushant 6/28/2023 4:38:00 AM

please upoad
EUROPEAN UNION


John 8/7/2023 12:09:00 AM

has anyone recently attended safe 6.0 certification? is it the samq question from here.
Anonymous


Blessious Phiri 8/14/2023 3:49:00 PM

expository experience
Anonymous


concerned citizen 12/29/2023 11:31:00 AM

52 should be b&c. controller failure has nothing to do with this type of issue. degraded state tells us its a raid issue, and if the os is missing then the bootable device isnt found. the only other consideration could be data loss but thats somewhat broad whereas b&c show understanding of the specific issues the question is asking about.
UNITED STATES


deedee 12/23/2023 5:10:00 PM

great help!!!
UNITED STATES


Samir 8/1/2023 3:07:00 PM

very useful tools
UNITED STATES


Saeed 11/7/2023 3:14:00 AM

looks a good platform to prepare az-104
Anonymous