Your company has received help desk calls from users about a new interface in Gmail that they had not seen before. They determined that it was a new feature that Google released recently. In the future, you'll need time to review the new features so you can properly train employees before they see changes.
What action should you take?
A. Company Profile > Profile > New User Features > Enable "Scheduled Release"
B. Apps > Google Workspace > Gmail > Uncheck "Enable Gmail Labs for my users"
C. Company Profile > Profile > New User Features > Enable "Rapid Release"
D. Device Management > Chrome > Device Settings > Stop auto-updates
In the years prior to your organization moving to Google Workspace, it was relatively common practice for users to create consumer Google accounts with their corporate email address (for example, to monitor Analytics, manage AdSense, and collaborate in Docs with other partners who were on Google Workspace.) You were able to address active employees' use of consumer accounts during the rollout, and you are now concerned about blocking former employees who could potentially still have access to those services even though they don't have access to their corporate email account.
What should you do?
A. Contact Google Enterprise Support to provide a list of all accounts on your domain(s) that access non-Google Workspace Google services and have them blocked.
B. Use the Transfer Tool for Unmanaged Accounts to send requests to the former users to transfer their account to your domain as a managed account.
C. Provide a list of all active employees to the managers of your company's Analytics, AdSense, etc. accounts, so they can clean up the respective access control lists.
D. Provision former user accounts with Cloud Identity licenses, generate a new Google password, and place them in an OU with all Google Workspace and Other Google Services disabled.
Your CISO is concerned about third party applications becoming compromised and exposing Google Workspace data you have made available to them. How could you provide granular insight into what data third party applications are accessing?
What should you do?
A. Create a report using the OAuth Token Audit Activity logs.
B. Create a report using the Calendar Audit Activity logs.
C. Create a report using the Drive Audit Activity logs.
D. Create a reporting using the API Permissions logs for Installed Apps.
Your company's Chief Information Security Officer has made a new policy where third-party apps should not have OAuth permissions to Google Drive. You need to reconfigure current settings to adhere to this policy. What should you do?
A. Access the Security Menu> API Reference > disable all API Access.
B. Access the Security Menu > API Permissions > choose Drive and Disable All Access.
C. Access the Security Menu > API Permissions > choose Drive and Disable High Risk Access.
D. Access Apps > Google Workspace > Drive and Docs > Sharing Settings and disable sharing outside of your domain
Your company wants to provide secure access for its employees. The Chief Information Security Officer disabled peripheral access to devices, but wants to enable 2-Step verification. You need to provide secure access to the applications using Google Workspace.
What should you do?
A. Enable additional security verification via email.
B. Enable authentication via the Google Authenticator.
C. Deploy browser or device certificates via Google Workspace.
D. Configure USB Yubikeys for all users.
Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?
A. Assign the pre-built security admin role to the security team members.
B. Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.
C. Assign the Super Admin Role to the security team members.
D. Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.
You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location. How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?
A. Configure a data region at the top level OU of your organization, and set the value to "Europe".
B. Add three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.
C. Configure a configuration group for European users, and set the data region to "Europe".
D. Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.
Your company moved to Google Workspace last month and wants to install Hangouts Meet Hardware in all of their conference rooms. This will allow employees to walk into a room and use the in-room hardware to easily join their scheduled meeting. A distributed training session is coming up, and the facilitator wants to make remote room joining even easier. Participants in remote rooms should walk into their room and begin receiving the training without having to take any actions to join the session.
How should you accomplish this?
A. In the Admin Console, select the devices in Meeting Room Hardware, select Call, and Enter the meeting code.
B. Room participants will need to start the meeting from the remote in the room.
C. By adding the rooms to the Calendar invite, they will all auto-join at the scheduled time.
D. Select Add Live Stream to the Calendar invite; all rooms added to the event will auto-join at the scheduled time.
Your admin quarantine is becoming a burden to manage due to a consistently high influx of messages that match the content compliance rule Your security team will not allow you to remove or relax this rule, and as a result, you need assistance processing the messages in the quarantine. What is the first step you should take to enable others to help manage the quarantine, while maintaining security?
A. Give the users super admin rights to view the admin quarantine.
B. Give the users Services > Gmail > Access Admin Quarantine admin privileges.
C. Configure the admin quarantine to allow end users to release messages.
D. Give the users Services > Security Center admin privileges.
Your company has an OU that contains your sales team and an OU that contains your market research team. The sales team is often a target of mass email from legitimate senders, which is distracting to their job duties. The market research team also receives that email content, but they want it because it often contains interesting market analysis or competitive intelligence. Constant Contact is often used as the source of these messages. Your company also uses Constant Contact for your own mass email marketing. You need to set email controls at the Sales OU without affecting your own outgoing email or the market research OU.
What should you do?
A. Create a blocked senders list as the Sales OU that contains the mass email sender addresses, but bypass this setting for Constant Contact emails.
B. Create a blocked senders list at the root level, and then an approved senders list at the Market Research OU, both containing the mass email sender addresses.
C. Create a blocked senders list at the Sales OU that contains the mass email sender addresses.
D. Create an approved senders list at the Market Research OU that contains the mass email sender addresses.