Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Google-Workspace-Administrator Associate Google Workspace Administrator Questions and Answers

Questions 4

You’ve noticed an increase in phishing emails that contain links to malicious files hosted on external Google Drives. These files often mimic legitimate documents and trick users into granting access to their accounts. You need to prevent users from accessing these malicious external Drive files, but allow them to access legitimate external files. What should you do? (Choose two.)

Options:

A.

Enforce stricter password policies.

B.

Conduct regular security awareness training to educate users.

C.

Create a Drive trust rule that blocks all external domains except for a pre-approved list of trusted partners.

D.

Deploy advanced malware detection software on all user devices to scan and block malicious files.

E Implement two-factor authentication for all users

Buy Now
Questions 5

Your company is undergoing a regulatory compliance audit. As part of the audit, you are required to demonstrate that you can preserve all electronic communications related to a specific project for a potential legal discovery process. You need to configure Google Vault to accomplish this goal. What should you do?

Options:

A.

Use the security investigation report to show Vault log events.

B.

Use the search and export functionality to identify all relevant communications within the project timeframe.

C.

Create a matter and a hold on all project-related data sources such as Email. Chat, and Drive within Google Workspace.

D.

Create a custom retention policy for the project data. Ensure that the policy covers the required retention period.

Buy Now
Questions 6

The innovation team at your organization has a dedicated room with prototype equipment. You need to make the room bookable, add the equipment, and ensure that there are no booking conflicts. Only the innovation team and the sales directors can access this room. What should you do?

Options:

A.

Create a separate Google Calendar resource for the room. Manually manage booking requests from both teams.

B.

Create a Google Group for the innovation team and another Google Group for sales directors. Share the room's calendar with both groups.

C.

Create a Google Calendar event for the room. Share the event with the innovation team and sales directors.

D.

Edit the Google Calendar settings for the room resource. Adjust the permission settings so only the innovation team and sales director group can view and book time on this calendar.

Buy Now
Questions 7

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

Options:

A.

Assign the trusted employees as moderators for the relevant Chat spaces.

B.

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared

C.

Use the security investigation tool to audit and monitor Chat messages.

D.

Disable all Chat spaces except those specifically approved by management.

Buy Now
Questions 8

An employee at your organization may be sharing confidential documents with unauthorized external parties. You must quickly determine if any sensitive information has been leaked. What should you do?

Options:

A.

Review the employee's Drive log events in the security investigation tool.

B.

Audit Drive access by using the Admin SDK Reports API.

C.

Review the employee's user log events within the security investigation tool.

D.

Create a custom report of the user's external sharing by using the security dashboard.

Buy Now
Questions 9

You need to grant a specific set of users in your company access to YouTube, and you want to restrict their access to Merchant Center. What should you do?

Options:

A.

Enable YouTube for all users in the company. Individually restrict access to Merchant Center for specific Groups or organizational units (OUs).

B.

Create YouTube and Merchant Center as custom web apps. Apply access policies at the Group or organizational unit (OU) level.

C.

Contact Google Support and request that they enable YouTube access for the specific set of users and restrict their access to Merchant Center.

D.

Enable access to YouTube at the Group or organizational unit (OU) level for the subset of users. Disable access to Merchant Center.

Buy Now
Questions 10

The current data storage limit for the sales organizational unit (OU) at your company is set at 10GB per user. A subset of sales representatives in that OU need 100GB of storage across shared services. You need to increase the storage for only the subset of sales representatives by using the least disruptive approach and the fewest configuration steps. What should you do?

Options:

A.

Move the subset of users to a sub-OU, and assign a 100GB storage limit to that sub-OU.

B.

Instruct the subset of users to store their documents in a Shared Drive with a 100GB limit.

C.

Change the storage limit of the sales OU to 100GB.

D.

Create a configuration group, and add the subset of users to that group. Set the group storage limit to 100GB.

Buy Now
Questions 11

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

Options:

A.

Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.

B.

Set up email forwarding from your on-premises email provider to Gmail.

C.

Create a content compliance rule to filter and route incoming emails.

D.

Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.

Buy Now
Questions 12

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company’s security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

Options:

A.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

B.

Assign the User Management Admin role to the security team.

C.

Assign the super admin role to the security team

D.

Create an administrator role with Security Center access. Assign the role to the security team.

Buy Now
Questions 13

An end user has thousands of files stored in Google Drive. Their files are well organized with Drive labels. You need to advise the end user on how to quickly identify all files that are contracts. What should you do?

Options:

A.

Advise the user to use the Google Drive API to search for files with the keyword "contracts'

B.

Advise the user to search in Drive for files with the keyword "contracts', and use the "modified by me' filter.

C.

Advise the user to search for files that are labeled as "contracts'.

D.

Advise the user to use the Investigation tool to search for files with the keyword "contracts' and updated by you.

Buy Now
Questions 14

Your company distributes an internal newsletter that contains sensitive information to all employees by email. You’ve noticed unauthorized forwarding of this newsletter to external addresses, potentiallyleading to data leaks. To prevent this, you need to implement a solution that automatically detects and blocks such forwarding while allowing legitimate internal sharing. What should you do?

Options:

A.

Add a banner to the newsletter that warns users that external sharing is prohibited.

B.

Create a Gmail content compliance rule that targets the internal newsletter, identifying instances of external forwarding. Configure the rule to reject the message when such forwarding is detected

C.

Develop an Apps Script project by using the Gmail API to scan sent emails for the newsletter content and external recipients. Automatically revoke access for violating users.

D.

Create a content compliance rule to modify the newsletter subject line, adding a warning against external forwarding.

Buy Now
Questions 15

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

Options:

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Buy Now
Questions 16

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

Options:

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Buy Now
Questions 17

Per regulatory requirements, your company is required to keep the data of employees located in Germany within Europe and the data of employees located in the US within the US. The employees in Germany are in a separate organizational unit (OU) than employees in the US. You need to ensure that where employee data is stored is in compliance with the location regulations.

What should you do?

Options:

A.

Instruct employees to use Drive for desktop to keep documents on their corporate computers.

B.

Create two Groups. Assign employees into the Germany or US Group based on their location. Use Google Drive trust rules to prevent sharing between the Groups.

C.

Navigate to the Data Regions function in the Admin console. Select the Europe region for employees in Germany, and select the US region for US employees.

D.

Navigate to the Data Regions function in the Admin console. Select 'No preference.'

Buy Now
Questions 18

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

Options:

A.

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.

B.

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.

C.

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.

D.

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.

Buy Now
Questions 19

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

Options:

A.

Adjust the organization’s mail content compliance settings in the Admin console.

B.

Advise users to individually allowlist senders.

C.

Disable spam filtering for all users.

D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.

Buy Now
Questions 20

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external GoogleGroups with their Google Workspace accounts without interrupting internal group usage. What should you do?

Options:

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.

B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.

C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.

D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.

Buy Now
Questions 21

Your company has just started using Search Ads 360. You need to limit access to Additional Google services for your entire organization by using the Admin console. Only the marketing team and a specific group of users from the web design team should have access. What should you do?

Options:

A.

Enable Search Ads 360 for both the marketing and web design team organizational units (OUs). Create a group to explicitly deny access to Search Ads 360. Assign the group to the web design users who should not have access.

B.

Enable Search Ads 360 at the top level of your organizational structure.

C.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a sub-OU under the marketing OU. and move the web design team users who need access into this sub-OU.

D.

Enable Search Ads 360 for the marketing organizational unit (OU). Create a new group in the Admin console that includes the web design team users who need access. Enable Search Ads 360 for that group.

Buy Now
Questions 22

Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?

Options:

A.

Create a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.

B.

Create a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.

C.

Create a Google Group and update the settings to allow anyone in the organization to join the group.

D.

Create a Google Group and appoint a group admin to manage the membership of this group.

Buy Now
Questions 23

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Options:

A.

Create a folder inside the shared drive. Share the files with the group by using the share function.

B.

Create a folder inside the shared drive. Share the folder link with the group.

C.

In the Admin console, assign Contributor access for the shared drive to each user. Assign Content Manager access for the shared drive to the single user.

D.

In the Admin console, assign Contributor access for the shared drive to the group. Assign Content Manager access for the shared drive to the single user.

Buy Now
Questions 24

Your organization is concerned about unauthorized access attempts. You want to implement a security measure that makes users change their password if there are twenty or more failed login attempts within one hour. You want to use the most effective and efficient approach. What should you do?

Options:

A.

Set up a Chrome action rule to restrict users from defined ChromeOS actions after twenty failed password attempts.

B.

Create an activity rule for user log events, define a time period and threshold, and select an Action for the rule to force a password change.

C.

Create an activity rule for live-state data sources that meets the required time period and threshold to identify users who need to change their password.

D.

Enable email alerts to notify users that they need to change their password.

Buy Now
Questions 25

The legal department at your organization is working on a time-critical merger and acquisition (M&A) deal. They urgently require access to specific email communications from an employee who is currently on leave. The organization’s current retention policy is set to indefinite. You need to retrieve the required emails for the legal department in a manner that ensures data privacy. What should you do?

Options:

A.

Instruct the IT department to directly access and forward the relevant emails to the legal department.

B.

Temporarily grant the legal department access to the employee’s email account with a restricted scope that is limited to the M&A-related emails.

C.

Ask a colleague with delegate access to the employee's mailbox to identify and forward the relevant emails to the legal department.

D.

Use Google Vault to create a matter specific to the M&A deal. Search for relevant emails within the employee's mailbox. Export and share relevant emails with your legal department.

Buy Now
Questions 26

You are configuring Chrome browser security policies for your organization. These policies must restrict certain Chrome apps and extensions.

You need to ensure that these policies are applied on the devices regardless of which user logs into the device. What should you do?

Options:

A.

Configure the allowed list of apps in the Devices page in the apps and extensions settings.

B.

Configure the Chrome user setting to require users to sign in to use Chrome apps and extensions.

C.

Configure the Policy Precedence to override the domain-wide policy applied for apps and extensions.

D.

Require 2SV for user logins.

Buy Now
Questions 27

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Buy Now
Exam Name: Associate Google Workspace Administrator
Last Update: Apr 17, 2025
Questions: 90

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now Google-Workspace-Administrator testing engine

PDF (Q&A)

$42  $104.99
buy now Google-Workspace-Administrator pdf