Google Professional Google Workspace Administrator Exam (page: 8)
Google Professional Workspace Administrator
Updated on: 09-Feb-2026

The company's ten most senior executives are to have their offices outfitted with dedicated, standardized video conference cameras, microphones, and screens. The goal is to reduce the amount of technical support they require due to frequent, habitual switching between various mobile and PC devices throughout their busy days. You must ensure that it is easier for the executives to join Meet video conferences with the dedicated equipment instead of whatever device they happen to have available.

What should you do?

  1. Set up unmanaged Chromeboxes and set the executives' homepage to meet.google.com via Chrome settings.
  2. Set up the executive offices as reservable Calendar Resources, deploy Hangouts Meet Hardware Kits, and associate the Meet hardware with the room calendars.
  3. Deploy Hangouts Meet Hardware Kits to each executive office, and associate the Meet hardware with the executives' calendars.
  4. Provision managed Chromeboxes and set the executives' Chrome homepage to meet. google.com via device policy.

Answer(s): B

Explanation:

Create Calendar Resources:
In the Google Workspace Admin console, navigate to "Directory" > "Buildings and resources" > "Manage resources".
Create new resources for each executive office and name them appropriately.
Deploy Hangouts Meet Hardware Kits:
Set up the Hangouts Meet Hardware Kits in each executive office. Connect the hardware kits to the network and ensure they are configured correctly.
Associate Meet Hardware with Room Calendars:
Link each Hangouts Meet Hardware Kit to the corresponding room calendar resource. This allows meetings scheduled in the room to automatically connect to the Meet hardware.
Set Up and Test:
Ensure that the hardware is functioning correctly by testing video conferences. Train executives on how to use the dedicated equipment for joining Meet video conferences.
Reference
Google Workspace Admin Help: Manage buildings and resources Google Workspace: Hangouts Meet hardware setup



Your company works regularly with a partner. Your employees regularly send emails to your partner's employees. You want to ensure that the Partner contact information available to your employees will allow them to easily select Partner names and reduce sending errors.

What should you do?

  1. Educate users on creating personal contacts for the Partner Employees.
  2. Add a secondary domain for the Partner Company and create user entries for each Partner user.
  3. Create shared contacts in the Directory using the Directory API.
  4. Create shared contacts in the Directory using the Domain Shared Contacts API.

Answer(s): D

Explanation:

Enable API Access:
In the Google Workspace Admin console, go to "Security" > "API controls". Enable API access and ensure the Domain Shared Contacts API is enabled.
Use Domain Shared Contacts API:
Develop a script or application to use the Domain Shared Contacts API to create shared contacts. Include the partner employees' contact information in the shared contacts list.
Upload Shared Contacts:
Use the script or application to upload the shared contacts to the Google Workspace Directory. Ensure all partner contacts are correctly added and available to your employees.
Verify and Educate Users:
Verify that the shared contacts are visible to your employees in their Google Contacts. Educate users on how to access and use the shared contacts to reduce sending errors.
Reference
Google Workspace Admin Help: Domain Shared Contacts API Google Workspace Admin Help: Manage shared contacts



Security and Compliance has identified secure third-party applications that should have access to Google Workspace dat

  1. You need to restrict third-party access to only approved applications What two actions should you take? (Choose two.)
  2. Whitelist Trusted Apps
  3. Disable the Drive SDK
  4. Restrict API scopes
  5. Disable add-ons for Gmail
  6. Whitelist Google Workspace Marketplace apps

Answer(s): A,E

Explanation:

Whitelist Trusted Apps:
In the Google Workspace Admin console, go to "Security" > "API controls". Under "App access control," select "Manage third-party app access". Add the approved applications to the whitelist, allowing only these apps to access Google Workspace data.
Whitelist Google Workspace Marketplace Apps:
In the Admin console, navigate to "Apps" > "Google Workspace Marketplace apps". Browse and select the trusted apps that need access to Google Workspace data.

Approve and whitelist these apps to ensure only verified applications can access the data.
Reference
Google Workspace Admin Help: Control which third-party & internal apps access Google Workspace data
Google Workspace Admin Help: Google Workspace Marketplace



Your-company.com recently started using Google Workspace. The CIO is happy with the deployment, but received notifications that some employees have issues with consumer Google accounts (conflict accounts). You want to put a plan in place to address this concern.

What should you do?

  1. Use the conflict account remove tool to remove the accounts from Google Workspace.
  2. Rename the accounts to temp@your-company.com, and recreate the accounts.
  3. Ask users to request a new Google Workspace account from your local admin.
  4. Use the Transfer tool for unmanaged users to find the conflict accounts.

Answer(s): D

Explanation:

Access the Transfer Tool:
In the Google Workspace Admin console, navigate to "Users" > "Transfer tool for unmanaged users".
Identify Conflict Accounts:
Use the tool to search for unmanaged users (conflict accounts) that have email addresses matching your company domain.
Send Transfer Requests:
Send transfer requests to the identified unmanaged users, asking them to transfer their accounts to your Google Workspace domain.
Complete the Transfer:
Guide the users through the transfer process to ensure their accounts are moved to the managed

Google Workspace environment.
Verify the transfer completion and resolve any remaining conflicts.
Reference
Google Workspace Admin Help: Transfer tool for unmanaged users



HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.

What two actions should you take? (Choose two.)

  1. Extend the legal hold on the user's email data.
  2. Move project files to a Team Drive or transfer ownership.
  3. Rename the account to the new user starting next week.
  4. Delete the account, freeing up a Google Workspace License.
  5. Assign the terminated user account an Archive User license.

Answer(s): B,E

Explanation:

https://support.google.com/vault/answer/2473591?hl=en



Viewing Page 8 of 41



Share your comments for Google Professional Google Workspace Administrator exam with other users:

Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES


Sonia 7/23/2023 4:03:00 PM

very helpfull
UNITED STATES


binEY 10/6/2023 5:15:00 AM

good questions
Anonymous


Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous


RS 7/27/2023 7:17:00 AM

very very useful page
INDIA


Blessious Phiri 8/12/2023 11:47:00 AM

the exams are giving me an eye opener
Anonymous


AD 10/22/2023 9:08:00 AM

3rd so far, need to cover more
Anonymous


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous


Sri 10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework
GERMANY


H.T.M. D 6/25/2023 2:55:00 PM

kindly please share dumps
Anonymous


Satish 11/6/2023 4:27:00 AM

it is very useful, thank you
Anonymous


Chinna 7/30/2023 8:37:00 AM

need safe rte dumps
FRANCE


1234 6/30/2023 3:40:00 AM

can you upload the cis - cpg dumps
Anonymous


Did 1/12/2024 3:01:00 AM

q6 = 1. download odt application 2. create a configuration file (xml) 3. setup.exe /download to download the installation files 4. setup.exe /configure to deploy the application
FRANCE


John 10/12/2023 12:30:00 PM

great material
Anonymous


Dinesh 8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.
Anonymous


LBert 6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??
NETHERLANDS


g 12/22/2023 1:51:00 PM

so far good
UNITED STATES


Milos 8/4/2023 9:33:00 AM

question 31 has obviously wrong answers. tls and ssl are used to encrypt data at transit, not at rest.
Serbia And Montenegro


Diksha 9/25/2023 2:32:00 AM

pls provide dump for 1z0-1080-23 planning exams
Anonymous