Your organization is on G Suite Enterprise and allows for external sharing of Google Drive files to facilitate collaboration with other G Suite customers. Recently you have had several incidents of files and folders being broadly shared with external users and groups. Your chief security officer needs data on the scope of external sharing and ongoing alerting so that external access does not have to be disabled.
What two actions should you take to support the chief security officer's request? (Choose two.)
A. Review who has viewed files using the Google Drive Activity Dashboard.
B. Create an alert from Drive Audit reports to notify of external file sharing.
C. Review total external sharing in the Aggregate Reports section.
D. Create a custom Dashboard for external sharing in the Security Investigation Tool.
E. Automatically block external sharing using DLP rules.
Your Chief Information Security Officer is concerned about phishing. You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks. The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.
Where do you find the information your CISO is interested in seeing?
A. Security > Advanced Security Settings > Phishing Attempts
B. Apps > G Suite > Gmail > Phishing Attempts
C. Security > Dashboard > Spam Filter: Phishing
D. Reporting > Reports > Phishing
On which two platforms can you push WiFi connection information with G Suite? (Choose two.)
A. Mac OS
B. Windows
C. Chrome OS
D. iOS
E. Linux
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to
do the following on these devices:
Control password policies.
Make corporate apps available to the users.
Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
A. Turn on Advanced Mobile Management for the domain.
B. Turn on Advanced Mobile Management for Sales OU
C. Set up Device Approvals.
D. Set up an Apple Push Certificate.
E. Deploy Apple Certificate to every device.
You are using Google Cloud Directory Sync to manage users. You performed an initial sync of nearly 1,000 mailing lists to Google Groups with Google Cloud Directory Sync and now are planning to manage groups directly from Google. Over half the groups have been configured with incorrect settings, including who can post, who can join, and which groups can have external members. You need to update groups to be configured correctly.
What should you do?
A. Use the bulk upload with CSV feature in the G Suite Admin panel to update all Groups.
B. Update your configuration file and resync mailing lists with Google Cloud Directory Sync.
C. Create and assign a custom admin role for all group owners so they can update settings.
D. Use the Groups Settings API to update Google Groups with desired settings.
In your organization, users have been provisioned with either G Suite Enterprise, G Suite Business, or no
license, depending on their job duties, and the cost of user licenses is paid out of each division's budget. In
order to effectively manage the license disposition, team leaders require the ability to look up the type of
license that is currently assigned, along with the last logon date, for their direct reports.
You have been tasked with recommending a solution to the Director of IT, and have gathered the following
requirements:
Team leaders must be able to retrieve this data on their own (i.e., self-service).
Team leaders are not permitted to have any level of administrative access to the G Suite Admin panel.
Team leaders must only be able to look up data for their direct reports.
The data must always be current to within 1 week.
Costs must be mitigated.
What approach should you recommend?
A. Export log data to BigQuery with custom scopes.
B. Use a third-party tool.
C. Use App Script and filter views within a Google Sheet.
D. Create an app using AppMaker and App Script.
HR informs you that a user has been terminated and their account has been suspended. The user is part of a current legal investigation, and HR requires the user's email data to remain on hold. The terminated user's team is actively working on a critical project with files owned by the user. You need to ensure that the terminated user's content is appropriately kept before provisioning their license to a new user.
What two actions should you take? (Choose two.)
A. Extend the legal hold on the user's email data.
B. Move project files to a Team Drive or transfer ownership.
C. Rename the account to the new user starting next week.
D. Delete the account, freeing up a G Suite License.
E. Assign the terminated user account an Archive User license.
How can you monitor increases in user reported Spam as identified by Google?
A. Review post-delivery activity in the Email logs.
B. Review user-reported spam in the Investigation Tool.
C. Review spike in user-reported spam in the Alert center.
D. Review post-delivery activity in the BigQuery Export.
Your organization syncs directory data from Active Directory to G Suite via Google Cloud Directory Sync. Users and Groups are updated from Active Directory on an hourly basis. A user's last name and primary email address have to be changed. You need to update the user's data.
What two actions should you take? (Choose two.)
A. Add the user's old email address to their account in the G Suite Admin panel.
B. Change the user's primary email address in the G Suite Admin panel.
C. Change the user's last name in the G Suite Admin panel.
D. Change the user's primary email in Active Directory.
E. Change the user's last name in Active Directory.
Your organization deployed G Suite Enterprise within the last year, with the support of a partner. The deployment was conducted in three stages: Core IT, Google Guides, and full organization. You have been tasked with developing a targeted ongoing adoption plan for your G Suite organization.
What should you do?
A. Use Google Guides to deliver ad-hoc training to all of their co-workers and reports.
B. Use Work Insights to gather adoption metrics and target your training exercises.
C. Use Reports APIs to gather adoption metrics and Gmail APIs to deliver training content directly.
D. Use a script to monitor Email attachment types and target users that aren't using Drive sharing.