Google Professional Workspace Administrator Professional Google Workspace Administrator Exam Questions in PDF

Free Google Professional Google Workspace Administrator Dumps Questions (page: 5)

Security and Compliance has identified that data is being leaked through a third-party application connected to Google Workspace. You want to investigate using an audit log.

What log should you use?

  1. Admin audit log
  2. SAML audit log
  3. Drive usage audit log
  4. OAuth Token audit log

Answer(s): D

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com. Security Settings: Navigate to Security > Access and Data Control > API controls.
Audit Log:
Click on "OAuth Token Audit Log".
Review the log entries for any suspicious third-party applications that have access to your Google Workspace data.

Investigate:
Identify and investigate any suspicious activities or applications listed in the audit log. Revoke access to any untrusted third-party applications.
Reference
Google Workspace Admin: View OAuth Token audit log



Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.

What should you do?

  1. Enable additional security verification via email.
  2. Enable authentication via the Google Authenticator.
  3. Deploy browser or device certificates via Google Workspace.
  4. Configure USB Yubikeys for all users.

Answer(s): B

Explanation:

2-Step Verification (2SV):
2-Step Verification adds an extra layer of security by requiring users to verify their identity using a second factor in addition to their password. This helps protect against unauthorized access, even if the password is compromised.
Google Authenticator:
Google Authenticator is a mobile app that generates time-based one-time passcodes (TOTP) for 2SV. It works even when the device is offline, providing a secure and reliable second factor for authentication.
Implementation Steps:
Enable 2-Step Verification:
Go to the Google Admin console (admin.google.com).

Navigate to Security > Authentication > 2-Step Verification.
Turn on 2-Step Verification for the organization.
Deploy Google Authenticator:
Instruct users to download the Google Authenticator app from their respective app stores (iOS or Android).
Provide guidance on setting up Google Authenticator with their Google Workspace accounts. Users will scan a QR code provided during the setup process to link their account with the Authenticator app.
Advantages of Google Authenticator:
Security: It provides a highly secure method of 2-step verification as the codes are generated on the user's device and change every 30 seconds.
Ease of Use: It's easy to set up and use, with a straightforward user interface.

Offline Functionality: Codes can be generated even without internet access, ensuring consistent access to 2SV codes.
Why Other Options Are Less Suitable:
A . Enable additional security verification via email:
Email-based verification is less secure than app-based 2SV because email accounts can be more easily compromised.
C . Deploy browser or device certificates via Google Workspace:
While device certificates add security, they are typically used for device management and access control rather than for 2-step verification purposes.
D . Configure USB Yubikeys for all users:
USB Yubikeys are highly secure and suitable for 2SV, but they require physical distribution and management of hardware tokens, which can be logistically complex and costly. Given the context of disabled peripheral access, this option might contradict the policy of the Chief Information Security Officer.


Reference:

Google Workspace Admin Help: Set up 2-Step Verification Google Workspace Security: 2-Step Verification



A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:

Control password policies.
Make corporate apps available to the users.
Remotely wipe the device if it's lost or compromised

What two steps are required before configuring the device policies? (Choose two.)

  1. Turn on Advanced Mobile Management for the domain.
  2. Turn on Advanced Mobile Management for Sales OU
  3. Set up Device Approvals.
  4. Set up an Apple Push Certificate.
  5. Deploy Apple Certificate to every device.

Answer(s): B,D

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com.
Enable Advanced Mobile Management for Sales OU:
Navigate to Devices > Mobile & endpoints > Settings.
Select the Sales OU and turn on Advanced Mobile Management.
Set Up an Apple Push Certificate:
Go to Devices > Mobile & endpoints > Apple certificates.

Follow the instructions to obtain and upload an Apple Push Certificate.
Device Policies:
After setting up the Apple Push Certificate, configure the desired device policies such as password policies, app distribution, and remote wipe capabilities.
Reference
Google Workspace Admin: Set up advanced mobile management Google Workspace Admin: Set up an Apple Push Certificate



Your client is a 5,000-employee company with a high turn-over rate that requires them to add and suspend user accounts.
When new employees are onboarded, a user object is created in Active Directory. They have determined that manually creating the users in Google Workspace Admin Panel is time-consuming and prone to error. You need to work with the client to identify a method of creating new users that will reduce time and error.

What should you do?

  1. Install Google Cloud Directory Sync on all Domain Controllers.
  2. Install Google Workspace Sync for Microsoft Outlook on all employees' computers.
  3. Install Google Cloud Directory Sync on a supported server.
  4. Install Google Apps Manager to automate add-user scripts.

Answer(s): C

Explanation:

Prepare Environment: Ensure you have a supported server to install Google Cloud Directory Sync (GCDS).
Download GCDS:
Download Google Cloud Directory Sync from the Google Workspace Downloads page.
Install GCDS:
Follow the installation instructions provided by Google to install GCDS on the server.
Configuration:
Configure GCDS to synchronize user data from Active Directory to Google Workspace.

Set up synchronization rules and schedules to ensure that user data is kept up to date automatically.
Testing and Deployment:
Test the synchronization to ensure that new user accounts are created accurately in Google Workspace.
Deploy GCDS in the production environment after successful testing.
Reference
Google Workspace Admin: About Google Cloud Directory Sync Google Workspace Admin: Install and Set Up GCDS



A company has thousands of Chrome devices and bandwidth restrictions. They want to distribute the Chrome device updates over a period of days to avoid traffic spikes that would impact the low bandwidth network.

Where should you enable this in the Chrome management settings?

  1. Randomly scatter auto-updates.
  2. Update over cellular.
  3. Disable Auto update.
  4. Throttle the bandwidth.

Answer(s): A

Explanation:

Admin Console: Log into the Google Admin console at admin.google.com. Devices Management: Navigate to Devices > Chrome > Settings.
Configuration:
Under the "Chrome management" section, select "User & browser settings". Choose the organizational unit where you want to apply this setting.
Auto-Updates Settings:
Scroll down to the "Auto-update settings" section.
Enable the "Randomly scatter auto-updates" option. This setting will spread out the updates over a period of time, reducing the load on your network.
Save Changes: Click "Save" to apply the changes.
Reference
Google Workspace Admin: Manage automatic updates



Share your comments for Google Professional Google Workspace Administrator exam with other users:

A
Anonymous User
2/2/2024 6:42:12 PM

Upload this exam please!

N
Nicholas
2/2/2024 6:17:08 PM

Thank you for providing these questions. It helped me a lot with passing my exam.

T
Timi
8/19/2023 5:30:00 PM

my first attempt

B
Blessious Phiri
8/13/2023 10:32:00 AM

very explainable

M
m7md ibrahim
5/26/2023 6:21:00 PM

i think answer of q 462 is variance analysis

T
Tehu
5/25/2023 12:25:00 PM

hi i need see questions

A
Ashfaq Nasir
1/17/2024 1:19:00 AM

best study material for exam

R
Roberto
11/27/2023 12:33:00 AM

very interesting repository

N
Nale
9/18/2023 1:51:00 PM

american history 1

T
Tanvi
9/27/2023 4:02:00 AM

good level of questions

B
Boopathy
8/17/2023 1:03:00 AM

i need this dump kindly upload it

S
s_123
8/12/2023 4:28:00 PM

do we need c# coding to be az204 certified

B
Blessious Phiri
8/15/2023 3:38:00 PM

excellent topics covered

M
Manasa
12/5/2023 3:15:00 AM

are these really financial cloud questions and answers, seems these are basic admin question and answers

N
Not Robot
5/14/2023 5:33:00 PM

are these comments real

K
kriah
9/4/2023 10:44:00 PM

please upload the latest dumps

E
ed
12/17/2023 1:41:00 PM

a company runs its workloads on premises. the company wants to forecast the cost of running a large application on aws. which aws service or tool can the company use to obtain this information? pricing calculator ... the aws pricing calculator is primarily used for estimating future costs

M
Muru
12/29/2023 10:23:00 AM

looks interesting

T
Tech Lady
10/17/2023 12:36:00 PM

thanks! that’s amazing

M
Mike
8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.

N
Nobody
9/18/2023 6:35:00 PM

q 14 should be dmz sever1 and notepad.exe why does note pad have a 443 connection

M
Muhammad Rawish Siddiqui
12/4/2023 12:17:00 PM

question # 108, correct answers are business growth and risk reduction.

E
Emmah
7/29/2023 9:59:00 AM

are these valid chfi questions

M
Mort
10/19/2023 7:09:00 PM

question: 162 should be dlp (b)

E
Eknath
10/4/2023 1:21:00 AM

good exam questions

N
Nizam
6/16/2023 7:29:00 AM

I have to say this is really close to real exam. Passed my exam with this.

P
poran
11/20/2023 4:43:00 AM

good analytics question

A
Antony
11/23/2023 11:36:00 AM

this looks accurate

E
Ethan
8/23/2023 12:52:00 AM

question 46, the answer should be data "virtualization" (not visualization).

N
nSiva
9/22/2023 5:58:00 AM

its useful.

R
Ranveer
7/26/2023 7:26:00 PM

Pass this exam 3 days ago. The PDF version and the Xengine App is quite useful.

S
Sanjay
8/15/2023 10:22:00 AM

informative for me.

T
Tom
12/12/2023 8:53:00 PM

question 134s answer shoule be "dlp"

A
Alex
11/7/2023 11:02:00 AM

in 72 the answer must be [sys_user_has_role] table.

AI Tutor 👋 I’m here to help!