You are the Workspace administrator for an international organization with Enterprise Plus Workspace licensing. A third of your employees are located in the United States, another third in Europe, and the other third geographically dispersed around the world. European employees are required to have their data stored in Europe. The current OU structure for your organization is organized by business unit, with no attention to user location. How do you configure Workspace for the fastest end user experience while also ensuring that European user data is contained in Europe?
A. Configure a data region at the top level OU of your organization, and set the value to "Europe".
B. Add three additional OU structures to designate location within the current OU structure. Assign the corresponding data region to each.
C. Configure a configuration group for European users, and set the data region to "Europe".
D. Configure three configuration groups within your domain. Assign the appropriate data regions to each corresponding group, but assign no preference to the users outside of the United States and Europe.
How can you monitor increases in user reported Spam as identified by Google?
A. Review post-delivery activity in the Email logs.
B. Review user-reported spam in the Investigation Tool.
C. Review spike in user-reported spam in the Alert center.
D. Review post-delivery activity in the BigQuery Export.
Your company has decided to change SSO providers. Instead of authenticating into Google Workspace and other cloud services with an external SSO system, you will now be using Google as the Identity Provider (IDP) and SSO provider to your other third-party cloud services.
What two features are essential to reconfigure in Google Workspace? (Choose two.)
A. Apps > add SAML apps to your domain.
B. Reconfigure user provisioning via Google Cloud Directory Sync.
C. Replace the third-party IDP verification certificate.
D. Disable SSO with third party IDP.
E. Enable API Permissions for Google Cloud Platform.
Multiple users across the organization are experiencing video degradation in Meet video calls. As an administrator, what steps should you take to start troubleshooting?
A. Troubleshoot network bandwidth for the organizer of the meeting.
B. Push the Meet quality tool to end user devices and run local reports to determine connectivity issues.
C. Locate the Meet quality tool, and review the output for issues with quality.
D. Update the Admin Console Meet settings to disable streaming.
Your company has a broad, granular IT administration team, and you are in charge of ensuring proper administrative control. One of those teams, the security team, requires access to the Security Investigation Tool. What should you do?
A. Assign the pre-built security admin role to the security team members.
B. Create a Custom Admin Role with the Security Center privileges, and then assign the role to each of the security team members.
C. Assign the Super Admin Role to the security team members.
D. Create a Custom Admin Role with the security settings privilege, and then assign the role to each of the security team members.
Your-company.com finance departments want to create an internal application that needs to read data from spreadsheets. As the collaboration engineer, you suggest using App Maker. The Finance team is concerned about data security when creating applications with App Maker.
What security measures should you implement to secure data?
A. Use Roles, Script, and Owner access permissions for operations on records and data relations.
B. Enable App Maker access only for the Finance department Organization Unit.
C. Use a service account with limited permissions to access each data source.
D. Change owner access permissions to allow internal usage only.
A company wants to distribute iOS devices to only the employees in the Sales OU. They want to be able to do the following on these devices:
1.
Control password policies.
2.
Make corporate apps available to the users.
3.
Remotely wipe the device if it's lost or compromised
What two steps are required before configuring the device policies? (Choose two.)
A. Turn on Advanced Mobile Management for the domain.
B. Turn on Advanced Mobile Management for Sales OU
C. Set up Device Approvals.
D. Set up an Apple Push Certificate.
E. Deploy Apple Certificate to every device.
A user joined your organization and is reporting that every time they start their computer they are asked to sign in. This behavior differs from what other users within the organization experience. Others are prompted to sign in biweekly. What is the first step you should take to troubleshoot this issue for the individual user?
A. Reset the user's sign-in cookies
B. Confirm that this user has their employee ID populated as a sign-in challenge.
C. Check the session length duration for the organizational unit the user is provisioned in.
D. Verify that 2-Step Verification is enforced for this user.
A large enterprise that had a security breach is working with an external legal team to determine best practices for an investigation. Using Google Vault, the security team is tasked with exporting data for review by the legal team. What steps should you take to securely share the data in question?
A. Determine the scope of the investigation, create a Matter and Holds in Google Vault, and share with the legal team.
B. Immediately suspend the user's account, search for all the email messages in question, and forward to the legal team.
C. Immediately suspend the user's account, assign an archived user license, and export data.
D. Suspend the user's account, search all associated users data in Google Vault, and export the data.
You have configured SSO using a third-party IDP with your Google Workspace domain. An end user has reported that they cannot sign in to Google Workspace after their username was changed in the third-party SSO product. They can sign in to their other internal applications that use SSO. and no other users are experiencing issues signing in. What could be causing the sign-in issue?
A. The SAML assertion provided by the third-party IDP is presenting a username that conflicts with the current username configured in Google Workspace.
B. The user's Google password was changed administratively, which is causing a sign-in failure.
C. The issued certificate for that user has been revoked and must be updated before the user can have another successful sign in.
D. The SAML assertion is providing the user's previous password attached to their old username.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Google exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GOOGLE-WORKSPACE-ADMINISTRATOR exam preparations and Google certification application, do not hesitate to visit our Vcedump.com to find your solutions here.